From rushi.ns at sap.com Sat Apr 1 11:33:20 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Sat, 1 Apr 2017 17:33:20 +0000 Subject: [caasp-beta] caasp-beta Message-ID: <8667A6B4-A890-4222-B602-51C05F809B95@sap.com> The installation is still in error phase. Here is what I found , it may be due to repositories have a wrong image or missing ? Also my systems are behind proxy servers, so not sure if I need to update this file with proxy details ? /etc/salt # more minion # Set http proxy information for the minion when doing requests #proxy_host: #proxy_port: #proxy_username: #proxy_password: /etc/zypp/repos.d # more containers.repo [containers] name=containers type=rpm-md gpgcheck=0 enabled=1 autorefresh=1 # we only support Leap and CaaSP, and CaaSP will just not use this at all... baseurl=http://download.opensuse.org/repositories/Virtualization:/containers/openSUSE_Leap_1.0/ :/etc/zypp/repos.d # zypper repos Repository priorities are without effect. All enabled repositories share the same priority. # | Alias | Name | Enabled | GPG Check | Refresh --+------------------------------+------------------------------+---------+-----------+-------- 1 | SUSE-CaaS-Platform-1.0-1.0-0 | SUSE-CaaS-Platform-1.0-1.0-0 | Yes | (r ) Yes | No 2 | containers | containers | Yes | ( ) No | Yes lvccasmaster:/var/run/salt/minion # docker images REPOSITORY TAG IMAGE ID CREATED SIZE sles12/mariadb 10.0 3fe182f0c8c8 3 days ago 253.9 MB sles12/salt-api 2015.8.12 bc2a6b08a2d8 3 days ago 228.9 MB sles12/salt-master 2015.8.12 1c455d1294bf 3 days ago 230.1 MB sles12/salt-minion 2015.8.12 30f9cf2addd2 3 days ago 227.3 MB sles12/velum 0.0 1e4ba8033276 3 days ago 225.7 MB sles12/pause 1.0.0 8d2fd55095c8 3 days ago 143.5 MB sles12/pv-recycler-node 1.0.0 0805108ee034 3 days ago 135.6 MB Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Friday, March 31, 2017 at 8:22 PM To: "caasp-beta at lists.suse.com" Subject: caasp-beta Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image001.png at 01D2AAD3.61CFB7B0] [cid:image002.png at 01D2AAD3.61CFB7B0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 71693 bytes Desc: image001.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 58154 bytes Desc: image002.png URL: From abonilla at suse.com Sat Apr 1 11:59:21 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Sat, 1 Apr 2017 17:59:21 +0000 Subject: [caasp-beta] caasp-beta Message-ID: <647c4060-3071-4619-ad82-0e7f681b7dcf@email.android.com> Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image001.png at 01D2AA5C.820478D0] [cid:image002.png at 01D2AA5C.820478D0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE -------------- next part -------------- An HTML attachment was scrubbed... URL: From rushi.ns at sap.com Sat Apr 1 19:05:42 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Sun, 2 Apr 2017 01:05:42 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: References: <647c4060-3071-4619-ad82-0e7f681b7dcf@email.android.com> Message-ID: Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB12.91BB54E0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB12.91BB54E0] [cid:image003.png at 01D2AB12.91BB54E0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 192694 bytes Desc: image001.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 71693 bytes Desc: image002.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image003.png Type: image/png Size: 58154 bytes Desc: image003.png URL: From rushi.ns at sap.com Sat Apr 1 19:13:55 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Sun, 2 Apr 2017 01:13:55 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: References: <647c4060-3071-4619-ad82-0e7f681b7dcf@email.android.com> Message-ID: <427EE8BA-42F0-45DF-A21D-5BB5133232ED@sap.com> Hi Alejandro, Ok this one too fixed. Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? PALM00635056A:.kube i811144$ kubectl cluster-info Kubernetes master is running at https://lvcaasmaster:6443 To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. PALM00635056A:.kube i811144$ kubectl get nodes Nothing Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:05 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB13.B77D3490] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB13.B77D3490] [cid:image003.png at 01D2AB13.B77D3490] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 192695 bytes Desc: image001.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 71694 bytes Desc: image002.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image003.png Type: image/png Size: 58155 bytes Desc: image003.png URL: From rushi.ns at sap.com Sat Apr 1 21:14:51 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Sun, 2 Apr 2017 03:14:51 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: <427EE8BA-42F0-45DF-A21D-5BB5133232ED@sap.com> References: <647c4060-3071-4619-ad82-0e7f681b7dcf@email.android.com> <427EE8BA-42F0-45DF-A21D-5BB5133232ED@sap.com> Message-ID: <8A1EE690-1DAC-4024-A252-3EB97D3FFCFA@sap.com> Ok ?kubectl get nodes? empty issue too fixed. Basically every minion host in file /etc/kubernetes/kubelet value didn't match the hostname , so I had to add the hostname of the minion FQDN and restar the services. Now I get all my minions. PALM00635056A:.kube i811144$ kubectl get nodes NAME STATUS AGE lvcaasnode1 Ready 13m lvcaasnode2 Ready 5m lvcaasnode3 Ready 2m lvcaasnode4 Ready 1m Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:13 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok this one too fixed. Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? PALM00635056A:.kube i811144$ kubectl cluster-info Kubernetes master is running at https://lvcaasmaster:6443 To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. PALM00635056A:.kube i811144$ kubectl get nodes Nothing Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:05 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB24.9C6542E0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB24.9C6542E0] [cid:image003.png at 01D2AB24.9C6542E0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 192696 bytes Desc: image001.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 71695 bytes Desc: image002.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image003.png Type: image/png Size: 58156 bytes Desc: image003.png URL: From abonilla at suse.com Sat Apr 1 21:29:33 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Sun, 2 Apr 2017 03:29:33 +0000 Subject: [caasp-beta] caasp-beta Message-ID: Hi Rushi, Great news. So the certificate problem perhaps was a time mismatch of the validity due to a NTP time that is now acceptable. Then I wonder what names were in the kubelet file vs the correct hostname? Is it 'linux' or where does the mismatch come from? Thanks for the updates... On Apr 1, 2017 11:15 PM, " Ns, Rushi " wrote: Ok ?kubectl get nodes? empty issue too fixed. Basically every minion host in file /etc/kubernetes/kubelet value didn't match the hostname , so I had to add the hostname of the minion FQDN and restar the services. Now I get all my minions. PALM00635056A:.kube i811144$ kubectl get nodes NAME STATUS AGE lvcaasnode1 Ready 13m lvcaasnode2 Ready 5m lvcaasnode3 Ready 2m lvcaasnode4 Ready 1m Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:13 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok this one too fixed. Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? PALM00635056A:.kube i811144$ kubectl cluster-info Kubernetes master is running at https://lvcaasmaster:6443 To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. PALM00635056A:.kube i811144$ kubectl get nodes Nothing Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:05 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB24.9C6542E0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB24.9C6542E0] [cid:image003.png at 01D2AB24.9C6542E0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE -------------- next part -------------- An HTML attachment was scrubbed... URL: From rushi.ns at sap.com Sat Apr 1 21:47:52 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Sun, 2 Apr 2017 03:47:52 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: References: Message-ID: Hi Alejandro, Good but more issues (kubernetes dashboard issue ?unauthorized?) . Did you encounter any issues with kubernetes dashboard ? I get unauthorized when I browse https://lvcaasmaster:6443/ui I was looking seems the certificates seems either missing ? Aslo were you able to deploy any applications. I tried a simple one and its not getting deployed ?? keep looking more, but let me know if you have done and how you did , so that I can check. For that particular issue as you asked it was the file ?kubelet? on every minion to add the FQDN or IP address of the minion host. KUBELET_HOSTNAME="lvcaasnode1" Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Alejandro Bonilla Date: Saturday, April 1, 2017 at 8:29 PM To: "Ns, Rushi" Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Rushi, Great news. So the certificate problem perhaps was a time mismatch of the validity due to a NTP time that is now acceptable. Then I wonder what names were in the kubelet file vs the correct hostname? Is it 'linux' or where does the mismatch come from? Thanks for the updates... On Apr 1, 2017 11:15 PM, " Ns, Rushi " wrote: Ok ?kubectl get nodes? empty issue too fixed. Basically every minion host in file /etc/kubernetes/kubelet value didn't match the hostname , so I had to add the hostname of the minion FQDN and restar the services. Now I get all my minions. PALM00635056A:.kube i811144$ kubectl get nodes NAME STATUS AGE lvcaasnode1 Ready 13m lvcaasnode2 Ready 5m lvcaasnode3 Ready 2m lvcaasnode4 Ready 1m Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:13 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok this one too fixed. Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? PALM00635056A:.kube i811144$ kubectl cluster-info Kubernetes master is running at https://lvcaasmaster:6443 To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. PALM00635056A:.kube i811144$ kubectl get nodes Nothing Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:05 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB24.9C6542E0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB24.9C6542E0] [cid:image003.png at 01D2AB24.9C6542E0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE -------------- next part -------------- An HTML attachment was scrubbed... URL: From kukuk at suse.com Sun Apr 2 06:08:33 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Sun, 2 Apr 2017 14:08:33 +0200 Subject: [caasp-beta] CaaSP, certificates and date/time Message-ID: <20170402120833.GA24080@suse.com> Hi, as you should have noticed, the administration dashboard of CaaSP generates a certificate during the first login for communication with the cluster. Such a certificate only works, if the date/time on all machines in the cluster is correct. Our cloud-init documentation contains an example, how to configure ntpd with cloud-init during the first boot. If you don't want to use cloud-init, please configure ntpd yourself. If you don't want to use ntpd, you could also use systemd-timesyncd. For this, adjust /etc/systemd/timesyncd.conf and enable it with: # timedatectl set-ntp true For Beta3 we will think about a mechanism to automatically setup time synchronisation in the cluster. Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From rushi.ns at sap.com Sun Apr 2 09:45:06 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Sun, 2 Apr 2017 15:45:06 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: <219270BA-879D-4C89-87B3-6ABB3AC9E9AA@suse.com> References: <219270BA-879D-4C89-87B3-6ABB3AC9E9AA@suse.com> Message-ID: <374C7754-232C-4DCD-B475-1A62DB453C50@sap.com> Hi Rob, Yes, I tried the same and its installed, however access UI is showing unauthorized Also if you notice the kubernetes cluster is on https which prevents from browser (chrome or firefox) without certificates being installed . also if you notice the kubectl config has the certs information but they are not available in server side, so the only way to find those certs and install on the browser might give access. You can refer to this blog http://stackoverflow.com/questions/36270602/how-to-access-kubernetes-ui-via-browser server: https://lvcaasmaster:6443 certificate-authority-data: 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 Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Rob Knight Date: Sunday, April 2, 2017 at 12:36 AM To: "Ns, Rushi" Cc: Alejandro Bonilla , "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Rushi. I got dashboard access by following https://kubernetes.io/docs/user-guide/ui/#accessing-the-dashboard-ui Rob Sent from my iPhone - please excuse any shortness On 2 Apr 2017, at 04:48, Ns, Rushi > wrote: Hi Alejandro, Good but more issues (kubernetes dashboard issue ?unauthorized?) . Did you encounter any issues with kubernetes dashboard ? I get unauthorized when I browse https://lvcaasmaster:6443/ui I was looking seems the certificates seems either missing ? Aslo were you able to deploy any applications. I tried a simple one and its not getting deployed ?? keep looking more, but let me know if you have done and how you did , so that I can check. For that particular issue as you asked it was the file ?kubelet? on every minion to add the FQDN or IP address of the minion host. KUBELET_HOSTNAME="lvcaasnode1" Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Alejandro Bonilla > Date: Saturday, April 1, 2017 at 8:29 PM To: "Ns, Rushi" > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Rushi, Great news. So the certificate problem perhaps was a time mismatch of the validity due to a NTP time that is now acceptable. Then I wonder what names were in the kubelet file vs the correct hostname? Is it 'linux' or where does the mismatch come from? Thanks for the updates... On Apr 1, 2017 11:15 PM, " Ns, Rushi " > wrote: Ok ?kubectl get nodes? empty issue too fixed. Basically every minion host in file /etc/kubernetes/kubelet value didn't match the hostname , so I had to add the hostname of the minion FQDN and restar the services. Now I get all my minions. PALM00635056A:.kube i811144$ kubectl get nodes NAME STATUS AGE lvcaasnode1 Ready 13m lvcaasnode2 Ready 5m lvcaasnode3 Ready 2m lvcaasnode4 Ready 1m Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" > Date: Saturday, April 1, 2017 at 6:13 PM To: Alejandro Bonilla > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok this one too fixed. Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? PALM00635056A:.kube i811144$ kubectl cluster-info Kubernetes master is running at https://lvcaasmaster:6443 To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. PALM00635056A:.kube i811144$ kubectl get nodes Nothing Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" > Date: Saturday, April 1, 2017 at 6:05 PM To: Alejandro Bonilla > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB24.9C6542E0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" > Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB24.9C6542E0] [cid:image003.png at 01D2AB24.9C6542E0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta -------------- next part -------------- An HTML attachment was scrubbed... URL: From ralf.dannert at suse.com Mon Apr 3 07:46:56 2017 From: ralf.dannert at suse.com (Ralf Dannert) Date: Mon, 3 Apr 2017 15:46:56 +0200 Subject: [caasp-beta] Error while bringing up minion for multi-master Message-ID: <2aea7dc9-c358-188b-2d29-06ab2ce637a8@suse.com> hi list, setting up controller node, kubemaster und kubeworker done on casp controller node: # docker ps|grep 722f012800d8 722f012800d8 sles12/salt-minion:2015.8.12 "salt-minion.sh" 4 hours ago Up 4 hours k8s_salt-minion-ca.e7eb7182_salt-127.0.0.1_default_8b9ea9a3ae36e8415a00f336644f9a3f_8eb5dd2e # docker logs 722f012800d8 [ERROR ] Error while bringing up minion for multi-master. Is master at localhost responding? docker logs from sles12/salt-master:2015.8.12 and sles12/salt-api:2015.8.12 show nothing what should I investigate ? regards, Ralf From rushi.ns at sap.com Mon Apr 3 11:50:09 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Mon, 3 Apr 2017 17:50:09 +0000 Subject: [caasp-beta] Error while bringing up minion for multi-master In-Reply-To: <2aea7dc9-c358-188b-2d29-06ab2ce637a8@suse.com> References: <2aea7dc9-c358-188b-2d29-06ab2ce637a8@suse.com> Message-ID: Hi Ralf, I see the same issue in my environment, this is why my testing kubernetes guest book is failing too ? Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/3/17, 6:46 AM, "caasp-beta-bounces at lists.suse.com on behalf of Ralf Dannert" wrote: hi list, setting up controller node, kubemaster und kubeworker done on casp controller node: # docker ps|grep 722f012800d8 722f012800d8 sles12/salt-minion:2015.8.12 "salt-minion.sh" 4 hours ago Up 4 hours k8s_salt-minion-ca.e7eb7182_salt-127.0.0.1_default_8b9ea9a3ae36e8415a00f336644f9a3f_8eb5dd2e # docker logs 722f012800d8 [ERROR ] Error while bringing up minion for multi-master. Is master at localhost responding? docker logs from sles12/salt-master:2015.8.12 and sles12/salt-api:2015.8.12 show nothing what should I investigate ? regards, Ralf _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta From andrew.cole at suse.com Mon Apr 3 16:56:30 2017 From: andrew.cole at suse.com (Andrew Cole) Date: Mon, 03 Apr 2017 15:56:30 -0700 Subject: [caasp-beta] issues with pxe/autoyast/cloud-init Message-ID: <1491260190.116300.50.camel@suse.com> Hi I've been trying to use a combination of pxeboot, autoyast, and cloud- init to get a 10-node cluster up using the beta 2 ISO. I have an extra Leap 42.2 machine that is hosting DHCP, TFTP, and FTP for the PXE environment. On this pxe server machine I have the beta2 dvd1 iso mounted under ftp://192.168.2.11/repository, and I have my cloud-init data at ftp://192.168.2.11/cloud.cfg?[1] and ftp://192.168.2.11/cloud-i nit/user-data [2]. I start by manually installing a Dashboard node from the ISO. This goes fine. I can access Velum on this machine and it tells me to autoyast more machines with `autoyast=http://192.168.2.110/autoyast` On the pxe server, I specify the following in?/srv/tftpboot/pxelinux.cfg/default: label linux ? kernel linux ? append initrd=initrd splash=silent showopts autoyast=http://192.168.2 .110/autoyast install=ftp://192.168.2.11/repository cloud-init-url=ftp: //192.168.2.11/cloud.cfg I can now pxeboot systems in the environment and they seem to install caasp via autoyast successfully. However, I have two problems: 1. Systems brought up this way do not join the cluster-- they are not visible in the Velum UI, and `salt-key --list-all` from inside the salt-master container shows only 'ca' and the dashboard node. 2. I cannot access the pxe-booted machines to debug. I cannot log in because cloud-init does not seem to have used my user-data. Any advice is greatly appreciated. Thanks Andrew [1] pxe at pxe:~> cat /srv/ftp/cloud.cfg? #cloud-config datasource: ? NoCloud: ????seedfrom: ftp://192.168.2.11/cloud-init/ [2] pxe at pxe:~> cat /srv/ftp/cloud-init/user-data? #cloud-config debug: True disable_root: False ssh_authorized_keys: - ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoJe7lZTgWyULxkoH0/y7pM3VR+7ucBciTZD5zi6D JbJwV310A/a8UiUAIfl/zaANFOofZUv+icCnvufmqLyF+wTTW3gzmkNpMq0v8G6YjVzpDpk 17cr7MLYGrdC4IbhIbuY4T9RiAkToqcuGdO2czDOo8AUkW8/olkKDT3wn1lTjm8Q4N9CEal DQ8kKB00yT7C0bprt8J/hmSb6KLymNt1c995dHkr3UuvBM8seGChAvjCLteAaGR3hKYjIM+ k/0N3JOfE9f+ACKqe9qIPPp80hf0AXDRTW7rIHwjORgoV5cYKI8v32v8TqLLqsPgVsmdsK1 jAJdOyyH7W0FtF/AD From kukuk at suse.com Tue Apr 4 00:13:27 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Tue, 4 Apr 2017 08:13:27 +0200 Subject: [caasp-beta] issues with pxe/autoyast/cloud-init In-Reply-To: <1491260190.116300.50.camel@suse.com> References: <1491260190.116300.50.camel@suse.com> Message-ID: <20170404061327.GA9100@suse.com> Hi, On Mon, Apr 03, Andrew Cole wrote: > I can now pxeboot systems in the environment and they seem to install > caasp via autoyast successfully. However, I have two problems: > > 1. Systems brought up this way do not join the cluster-- they are not > visible in the Velum UI, and `salt-key --list-all` from inside the > salt-master container shows only 'ca' and the dashboard node. > 2. I cannot access the pxe-booted machines to debug. I cannot log in > because cloud-init does not seem to have used my user-data. > > Any advice is greatly appreciated. At a first glance I don't see anything obviously wrong. My suggestion: download the autoyast profile, store it somewhere else on your install server, set a root password (Replace the "!") and install without cloud-init configuration but the new autoyast profile. Now you should be able to login at the machine and look at the log files, why salt-minion cannot connect with the administration dashboard. If this works, we can try to find out why cloud-init does not work for you. Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From kukuk at suse.com Tue Apr 4 01:44:54 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Tue, 4 Apr 2017 09:44:54 +0200 Subject: [caasp-beta] Regcode SCC or SMT needed ? In-Reply-To: References: Message-ID: <20170404074454.GB21624@suse.com> Hi, On Tue, Apr 04, Sebastian.Zielenski at edeka.de wrote: > Hi guys, > > do I really need a Regcode or Smt conection for the installation ? No, you can do all installations with the DVD without Regcode and SMT. > If yes where do I get the Regcode from ? That's explained in the FAQ: https://www.suse.com/betaprogram/caasp-beta/#faq2 Regards, Thorsten > Regards > Sebastian > > > Mit freundlichen Gr??en > > i.A. Sebastian Zielenski > > LUNAR GmbH > Technologie > RZ-Technologie > Serversysteme > Technologe > > New-York-Ring 6 > 22297 Hamburg > > Tel.: +49 40 6377 - 8838 > > > > > mailto:sebastian.zielenski at edeka.de > > http://www.lunar-edeka.de > > EDEKA LUNAR GmbH, Hamburg, eingetragen beim Amtsgericht Hamburg HRB 113314 > Gesch?ftsf?hrer: Christoph Diekmeyer, Sylvia Rosellen Deniz > Ein Unternehmen der EDEKA ZENTRALE AG & Co. KG > --------------------------------------------------------------------------------------------------------------------------------------------------- > > HINWEIS: Diese Nachricht ist vertraulich und nur f?r den Adressaten bestimmt. > Sollten Sie irrt?mlich diese > Nachricht erhalten haben, bitten wir um Ihre Mitteilung per E-Mail oder unter > der oben angegebenen Telefonnummer. > NOTICE: This message is confidential and may be read, copied, disseminated or > otherwise used only by the intended recipient. > Should you have received this message in error, please contact us immediately > by return e-mail or by telephone at the number above. > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From Vinicius.Neuhauss at suse.com Mon Apr 3 13:53:52 2017 From: Vinicius.Neuhauss at suse.com (Vinicius Neuhauss) Date: Mon, 3 Apr 2017 19:53:52 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: References: Message-ID: I follow the steps from Alejandro , and now when I'm loging in the UI. I have the following error. { "kind": "Status", "apiVersion": "v1", "metadata": {}, "status": "Failure", "message": "endpoints \"kubernetes-dashboard\" not found", "reason": "NotFound", "details": { "name": "kubernetes-dashboard", "kind": "endpoints" }, "code": 404 } ________________________________________ From: caasp-beta-bounces at lists.suse.com [caasp-beta-bounces at lists.suse.com] on behalf of Alejandro Bonilla Sent: Sunday, April 02, 2017 12:29 AM To: Ns, Rushi Cc: caasp-beta at lists.suse.com Subject: Re: [caasp-beta] caasp-beta Hi Rushi, Great news. So the certificate problem perhaps was a time mismatch of the validity due to a NTP time that is now acceptable. Then I wonder what names were in the kubelet file vs the correct hostname? Is it 'linux' or where does the mismatch come from? Thanks for the updates... On Apr 1, 2017 11:15 PM, " Ns, Rushi " wrote: Ok ?kubectl get nodes? empty issue too fixed. Basically every minion host in file /etc/kubernetes/kubelet value didn't match the hostname , so I had to add the hostname of the minion FQDN and restar the services. Now I get all my minions. PALM00635056A:.kube i811144$ kubectl get nodes NAME STATUS AGE lvcaasnode1 Ready 13m lvcaasnode2 Ready 5m lvcaasnode3 Ready 2m lvcaasnode4 Ready 1m Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:13 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok this one too fixed. Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? PALM00635056A:.kube i811144$ kubectl cluster-info Kubernetes master is running at https://lvcaasmaster:6443 To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. PALM00635056A:.kube i811144$ kubectl get nodes Nothing Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 6:05 PM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB24.9C6542E0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla Cc: "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB24.9C6542E0] [cid:image003.png at 01D2AB24.9C6542E0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From fcastelli at suse.com Tue Apr 4 02:57:33 2017 From: fcastelli at suse.com (Flavio Castelli) Date: Tue, 4 Apr 2017 10:57:33 +0200 Subject: [caasp-beta] Error while bringing up minion for multi-master In-Reply-To: <2aea7dc9-c358-188b-2d29-06ab2ce637a8@suse.com> References: <2aea7dc9-c358-188b-2d29-06ab2ce637a8@suse.com> Message-ID: <638061ee-cb57-1442-cce3-48a9ae7def09@suse.com> On 04/03/2017 03:46 PM, Ralf Dannert wrote: > setting up controller node, kubemaster und kubeworker done Does that mean you successfully deployed a kubernetes cluster? > on casp controller node: > # docker ps|grep 722f012800d8 > 722f012800d8 sles12/salt-minion:2015.8.12 > "salt-minion.sh" 4 hours ago Up 4 hours > k8s_salt-minion-ca.e7eb7182_salt-127.0.0.1_default_8b9ea9a3ae36e8415a00f336644f9a3f_8eb5dd2e This salt container is used to generated the CA certificates of the kubernetes cluster. Why are you looking into that? Is that because the cluster wasn't deployed at all? Cheers Flavio From kukuk at suse.com Tue Apr 4 05:57:04 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Tue, 4 Apr 2017 13:57:04 +0200 Subject: [caasp-beta] has realy someone tried the installation ? In-Reply-To: References: Message-ID: <20170404115704.GA17257@suse.com> On Tue, Apr 04, Sebastian.Zielenski at edeka.de wrote: > Hi all, > > I am a little bit depressed because I tried the installation from scratch in > vcenter environment. > But after installation there is no ssh connection possible and also the the web > browser isn't starting. > > Routes , nameserver configuration , and networkconfiguration are fine. Any Idea > ? > > I tryed tit with the vmdk image suse shipped out but I couldn't find the root > password. As written: if you don't install with the DVD, you need to set a root password or ssh key with cloud-init. Thorsten > Regards > Sebastian > > Mit freundlichen Gr??en > > i.A. Sebastian Zielenski > > LUNAR GmbH > Technologie > RZ-Technologie > Serversysteme > Technologe > > New-York-Ring 6 > 22297 Hamburg > > Tel.: +49 40 6377 - 8838 > > > > > mailto:sebastian.zielenski at edeka.de > > http://www.lunar-edeka.de > > EDEKA LUNAR GmbH, Hamburg, eingetragen beim Amtsgericht Hamburg HRB 113314 > Gesch?ftsf?hrer: Christoph Diekmeyer, Sylvia Rosellen Deniz > Ein Unternehmen der EDEKA ZENTRALE AG & Co. KG > --------------------------------------------------------------------------------------------------------------------------------------------------- > > HINWEIS: Diese Nachricht ist vertraulich und nur f?r den Adressaten bestimmt. > Sollten Sie irrt?mlich diese > Nachricht erhalten haben, bitten wir um Ihre Mitteilung per E-Mail oder unter > der oben angegebenen Telefonnummer. > NOTICE: This message is confidential and may be read, copied, disseminated or > otherwise used only by the intended recipient. > Should you have received this message in error, please contact us immediately > by return e-mail or by telephone at the number above. > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From kukuk at suse.com Tue Apr 4 06:25:39 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Tue, 4 Apr 2017 14:25:39 +0200 Subject: [caasp-beta] Antwort: Re: has realy someone tried the installation ? In-Reply-To: References: <20170404115704.GA17257@suse.com> Message-ID: <20170404122539.GA19199@suse.com> Hi, On Tue, Apr 04, Sebastian.Zielenski at edeka.de wrote: > Hi Thorsten, > > How should I set a password via cloud-init when I can't login ? You don't need to login to set a password with cloud-init. Cloud-init is looking for "external" configuration files during boot. > The option with a local vmdk file is actually not what I want to do. My first > option is to set up the Beta in a REAL environment but up to the problems I > described before it doesn't seams to work. >From your email it is not really clear to me how you tried to do the installation. Our suggestion is: - Boot from the DVD (this works even inside VMware) and install the administration node/dashboard. - Connect to the machine with a web browser. You need to wait some minutes until all containers for the dashboard are started. Create an account and login. - Follow the instructions, how to install the additional cluster nodes from DVD with autoyast. Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From kukuk at suse.com Tue Apr 4 08:17:26 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Tue, 4 Apr 2017 16:17:26 +0200 Subject: [caasp-beta] Antwort: Re: Antwort: Re: has realy someone tried the installation ? In-Reply-To: References: <20170404115704.GA17257@suse.com> <20170404122539.GA19199@suse.com> Message-ID: <20170404141726.GA19851@suse.com> On Tue, Apr 04, Sebastian.Zielenski at edeka.de wrote: > Hi Thorsten, > > To be honest I don't want to setup cloud-init on my windows machine or an > external connection to get the password into your pre configured VM. You don't need to "setup" cloud-init. All you need to do is to create a USB-stick (or USB-stick image) with the configuration file. > How difficult is it to put the initial password into the first login screen ? That's not that difficult, we do that with JeOS. But while JeOS is a multiple purpose operating system, where you normally do not start many new machines at the same time, CaaSP is designed to start quickly a huge amount of new machines, which then should be added to the cluster. So letting the administrator go around and enter the root password everywhere will not scale. The feedback we got upfront was pretty clear: new nodes in the cluster should not require any manual interaction beside pressing the power button. > But anyway my first option is it still to install the CAAS in a testlab. And > believe my I just followed the installation introduction in the official > document and waited a long time before I tried to open the web browser but the > result is always the same the VM isn't available from the outside so I couldn't > start the web browser ore even ssh into the caas Controler from the outside. Ok, if you installed with the DVD, you had to specify a root password and you are now able to login on the administration node. If you login, are there any error messages in /var/log/messages, what does "docker ps" show? Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From Vinicius.Neuhauss at suse.com Tue Apr 4 08:52:11 2017 From: Vinicius.Neuhauss at suse.com (Vinicius Neuhauss) Date: Tue, 4 Apr 2017 14:52:11 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: <374C7754-232C-4DCD-B475-1A62DB453C50@sap.com> References: <219270BA-879D-4C89-87B3-6ABB3AC9E9AA@suse.com>, <374C7754-232C-4DCD-B475-1A62DB453C50@sap.com> Message-ID: I Instaled the dashboard using this documentation( https://kubernetes.io/docs/user-guide/ui/#accessing-the-dashboard-ui) in my laptop , but when i try to access the web ui I had this message: { "kind": "Status", "apiVersion": "v1", "metadata": {}, "status": "Failure", "message": "no endpoints available for service \"kubernetes-dashboard\"", "reason": "ServiceUnavailable", "code": 503 } jarvis:/home/neuhauss/Downloads # kubectl proxy Starting to serve on 127.0.0.1:8001^C jarvis:/home/neuhauss/Downloads # kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE kube-system kubernetes-dashboard-3203962772-nbfc5 1/1 Running 0 4h jarvis:/home/neuhauss/Downloads # kubectl get services -a --all-namespaces NAMESPACE NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE default kubernetes 172.21.0.1 443/TCP 4h kube-system kubernetes-dashboard 172.21.125.138 80:31512/TCP 4h jarvis:/home/neuhauss/Downloads # I also notice after reboot my vms , the nodes services are now duplicated. jarvis:/home/neuhauss/Downloads # kubectl get nodes NAME STATUS AGE 127.0.0.1 NotReady 4h worker1 Ready 4h worker1.vinicius.com NotReady 4h worker2 Ready 4h worker2.vinicius.com NotReady 4h worker3 Ready 4h worker3.vinicius.com NotReady 4h jarvis:/home/neuhauss/Downloads # ^C ________________________________________ From: caasp-beta-bounces at lists.suse.com [caasp-beta-bounces at lists.suse.com] on behalf of Ns, Rushi [rushi.ns at sap.com] Sent: Sunday, April 02, 2017 12:45 PM To: Rob Knight Cc: caasp-beta at lists.suse.com Subject: Re: [caasp-beta] caasp-beta Hi Rob, Yes, I tried the same and its installed, however access UI is showing unauthorized Also if you notice the kubernetes cluster is on https which prevents from browser (chrome or firefox) without certificates being installed . also if you notice the kubectl config has the certs information but they are not available in server side, so the only way to find those certs and install on the browser might give access. You can refer to this blog http://stackoverflow.com/questions/36270602/how-to-access-kubernetes-ui-via-browser server: https://lvcaasmaster:6443 certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUc0VENDQk1tZ0F3SUJBZ0lJZHg0Nm1CRmdzL013RFFZSktvWklodmNOQVFFTEJRQXdnYUF4Q3pBSkJnTlYKQkFZVEFsVlRNUll3RkFZRFZRUUREQTFqYkhWemRHVnlMbXh2WTJGc01SQXdEZ1lEVlFRSERBZHdZV3hoYkhSdgpNUXN3Q1FZRFZRUUlEQUpEUVRFTU1Bb0dBMVVFQ2d3RGMyRndNUTB3Q3dZRFZRUXFEQVJPYjI1bE1RMHdDd1lEClZRUUxEQVJuYkdSek1SOHdIUVlKS29aSWh2Y05BUWtCRmhCeWRYTm9hUzV1YzBCellYQXVZMjl0TVEwd0N3WUQKVlFRRURBUk9iMjVsTUI0WERURTNNRFF3TWpBd05UVXdOVm9YRFRJM01ETXpNVEF3TlRVd05Wb3dnYUF4Q3pBSgpCZ05WQkFZVEFsVlRNUll3RkFZRFZRUUREQTFqYkhWemRHVnlMbXh2WTJGc01SQXdEZ1lEVlFRSERBZHdZV3hoCmJIUnZNUXN3Q1FZRFZRUUlEQUpEUVRFTU1Bb0dBMVVFQ2d3RGMyRndNUTB3Q3dZRFZRUXFEQVJPYjI1bE1RMHcKQ3dZRFZRUUxEQVJuYkdSek1SOHdIUVlKS29aSWh2Y05BUWtCRmhCeWRYTm9hUzV1YzBCellYQXVZMjl0TVEwdwpDd1lEVlFRRURBUk9iMjVsTUlJQ0lqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FnOEFNSUlDQ2dLQ0FnRUExZE9pCm9sRUE3VkloOHdqS2JqNVgrMXpMcmJLZFVGTzdiYVhRazZ2K3kzOUlsT0l3Z3FQY2puRlFVbnVEcWkvTVorb1YKcmdXamZrK1A2MTdqSGx6d2dGcFVTSXVISTkxemM0RmJ4TXFIRThPdGZwczk1QXE3aTB1YUwvbStNV2VJUEZEUQoybTB6U0RoL291Slo0ZG1XVVFvZGxneEc2UmsvTGxuL2NuSVJ2ck8vTDU4NTlHVzYzNUZtc3c3Q2ZtaXF5U29GCjVPWmMwcHNCRW1ndXNqNHpiNm9mcjAwUW54VWVucHRVeXpMV0pLUlYwUzVYRFFUZ1N3SFVXalphK0ZjcVNNQUgKZ0cydUdwTW5pQkY4WXNlWkxhKzJvazd5YThNNjlWbGQvd2lwTEtHMi9KeWNWaDBBTEdSY01pRElTaVZvU0Vuawo2SHd3ajEyZGJpbFR1ZmpHcy9TZHFwQU9JT2Y2NE9JMVRCS1duaDBQUEl0M3dTOWpZUGo1ZmJYZWp1N05tODd1CmlkeHN2WXhHNEI4azkrSUw5TTlmTlZHYUpsenpxSFZDTUpCV29GT3g2QmtVN1NZOHh4eDlhU016L05VcXpHRkwKTkVzdHVxMHRvbkFheVI2dmZPOGNDUUtwYXRuZ3BPU1dLZTdHY2txc3Z1QzkwclM0dGVxMTE2b1lWWWd2UzQvWAp1S1Y0eldGbTJhKzlUZHk1RVIzTVNVWGFvTXYyQ2xjTHN2Wm1CVHFoSmEvTjJtU0VzOW91Kzc0MlJxUWdDUExtCnp1QUZJTm1ibVhyMzRLdmJXYUZBbXVTMlc1YU04VEYvc2JVN0ZtU0gzOWZZQm9wNUtMMmFlQmozamd4WUswUDYKdGdrenRzSmtqUzJUREc4NURTMnNmbnphS2NwRUJkSEx5cFgxZU1zQ0F3RUFBYU9DQVJzd2dnRVhNQThHQTFVZApFd0VCL3dRRk1BTUJBZjh3RGdZRFZSMFBBUUgvQkFRREFnRUdNQjBHQTFVZERnUVdCQlF3cGpzRTB1NUorMk1jCmpDb29GTXEvdENKNGJqQ0IxQVlEVlIwakJJSE1NSUhKZ0JRd3Bqc0UwdTVKKzJNY2pDb29GTXEvdENKNGJxR0IKcHFTQm96Q0JvREVMTUFrR0ExVUVCaE1DVlZNeEZqQVVCZ05WQkFNTURXTnNkWE4wWlhJdWJHOWpZV3d4RURBTwpCZ05WQkFjTUIzQmhiR0ZzZEc4eEN6QUpCZ05WQkFnTUFrTkJNUXd3Q2dZRFZRUUtEQU56WVhBeERUQUxCZ05WCkJDb01CRTV2Ym1VeERUQUxCZ05WQkFzTUJHZHNaSE14SHpBZEJna3Foa2lHOXcwQkNRRVdFSEoxYzJocExtNXoKUUhOaGNDNWpiMjB4RFRBTEJnTlZCQVFNQkU1dmJtV0NDSGNlT3BnUllMUHpNQTBHQ1NxR1NJYjNEUUVCQ3dVQQpBNElDQVFDYmlaZUx1R2VlNzhvYVZYT1VnS0ZpV0czWGF2bmdna1h1WlVvQzJUVEJrRG9WQ2JnYldNd2s1aHpHClJKclUwekliajhPakM0ZUtkaCt5bXBNTnRnd2J4cDNSVXdoYi9vTGZVRU5tSHAvMDVlTGp2ZjYrTkZYNHBmTUcKV3JKbWxFaFBZNExjWHhuOTRLbWdqa3FMZnQrM1B6VnZCZm9ncC9TQUJsSFo4Zm05bnhVVVlMcUhLdmJFbVF5MApWZGZ3T0IrN2JUdVRPQ2krckQvTFhCbVJrUklaZ1FvS0VDQVBlcUlzNzBQUmdwdjc4VFpLczlKU3dQWTdJcG5RCjVzeDVJbnNHdXB5ODUrN3VpdHRJRllRQytVQXpNWDZQbVk1OUEwaW1QS0NaUkFCZU9iR3BGWW9aUEZWcUtpVHgKWkk0ODFPZi8xTk5GTlVIZFNNeU5CdjZDN09NNmZrNHJsTmF1SVFlNzBEZ0RrQVJrT0dIYW5EY2lJRVc1c0pFSQpiTkhUdUV1NmF2QkNaU1prNW4wVk13cWxWQ0dJZ1RSdGpEK0h6TXg1RzJaaWlXYW1GKzdkYkJiZXFoN3p5QkZYCk1MUkhGV214YlF2Zms5QjhMMGJxMGdnV041SVRZejl6TFJBQzd6bVJJMDlrcWxkeW53WEJtU2JEZU91ZTA0bmIKdkJ5VU9rN0x6SExEMUhEZG9keHFJbkZtd2gxTldMdUhzN0RVcWFtYjZ4TnE1bjQva3F0WGRlZXB1d043L1VPdgo0VUZyZGdwRTRaSTIwMFp3Wnd1R1ZzNHpCYVVtQnM3UTFRYng5bHM4c0tCRVBKaWhDczBJRDBKQU5HRkNKcnAvCk9DSjVQb3NtWlhZUmx2c0VidXYzeDJ6Z09DcW52bE5qR25HdjVQT2kxejhLbkZrMi9RPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Rob Knight Date: Sunday, April 2, 2017 at 12:36 AM To: "Ns, Rushi" Cc: Alejandro Bonilla , "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] caasp-beta Rushi. I got dashboard access by following https://kubernetes.io/docs/user-guide/ui/#accessing-the-dashboard-ui Rob Sent from my iPhone - please excuse any shortness On 2 Apr 2017, at 04:48, Ns, Rushi > wrote: Hi Alejandro, Good but more issues (kubernetes dashboard issue ?unauthorized?) . Did you encounter any issues with kubernetes dashboard ? I get unauthorized when I browse https://lvcaasmaster:6443/ui I was looking seems the certificates seems either missing ? Aslo were you able to deploy any applications. I tried a simple one and its not getting deployed ?? keep looking more, but let me know if you have done and how you did , so that I can check. For that particular issue as you asked it was the file ?kubelet? on every minion to add the FQDN or IP address of the minion host. KUBELET_HOSTNAME="lvcaasnode1" Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Alejandro Bonilla > Date: Saturday, April 1, 2017 at 8:29 PM To: "Ns, Rushi" > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Rushi, Great news. So the certificate problem perhaps was a time mismatch of the validity due to a NTP time that is now acceptable. Then I wonder what names were in the kubelet file vs the correct hostname? Is it 'linux' or where does the mismatch come from? Thanks for the updates... On Apr 1, 2017 11:15 PM, " Ns, Rushi " > wrote: Ok ?kubectl get nodes? empty issue too fixed. Basically every minion host in file /etc/kubernetes/kubelet value didn't match the hostname , so I had to add the hostname of the minion FQDN and restar the services. Now I get all my minions. PALM00635056A:.kube i811144$ kubectl get nodes NAME STATUS AGE lvcaasnode1 Ready 13m lvcaasnode2 Ready 5m lvcaasnode3 Ready 2m lvcaasnode4 Ready 1m Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" > Date: Saturday, April 1, 2017 at 6:13 PM To: Alejandro Bonilla > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok this one too fixed. Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? PALM00635056A:.kube i811144$ kubectl cluster-info Kubernetes master is running at https://lvcaasmaster:6443 To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. PALM00635056A:.kube i811144$ kubectl get nodes Nothing Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" > Date: Saturday, April 1, 2017 at 6:05 PM To: Alejandro Bonilla > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Ok I have fixed it, I think it was due NTP issue. Ok its created. Now I get the certificates error after downloading the kubectl config. $ kubectl get nodes Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster [cid:image001.png at 01D2AB24.9C6542E0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: "Ns, Rushi" > Date: Saturday, April 1, 2017 at 11:40 AM To: Alejandro Bonilla > Cc: "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta Hi Alejandro, Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, Do you have time to go over on share screen I can show and see if we can fix this together Best Regards, Rushi. Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race Sent from my iPhone please excuse typos and brevity On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: Hi Rushi, I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... I deployed successfully and quite quickly by - Created 4 VMs - Each booted by DVD1 - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. Deployment finished in less than 5 minutes. On my laptop: Downloaded kubeconfig, then installed kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. mkdir ~/.kube cp kubeconfig ~/.kube/config Use kubectl :-) On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: Here is my beta test results. I setup total 5 systems (1 controller, 1 master, 3 workers) 1) Setup controller works fast and very quick too. 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. 3) Install cluster with selection ran several hours and I see the following Any other tools to see whats happening other than kubelet commands I used here. lvcaasadmin:/var/lib # kubelet list I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use [cid:image002.png at 01D2AB24.9C6542E0] [cid:image003.png at 01D2AB24.9C6542E0] from messages I see the following. event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta From abonilla at suse.com Tue Apr 4 12:21:32 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Tue, 4 Apr 2017 18:21:32 +0000 Subject: [caasp-beta] caasp-beta In-Reply-To: References: <219270BA-879D-4C89-87B3-6ABB3AC9E9AA@suse.com> <374C7754-232C-4DCD-B475-1A62DB453C50@sap.com> Message-ID: <258E7FDF-8EC6-49C1-A17D-117F7D8B1F07@suse.com> All, The Unauthorized is due to a authentication configuration we currently have, i.e. certs only vs user authentication. (Solution to this coming in another e-mail) To access the Dashboard (for) now, one can do: kubectl describe pod kubernetes-dashboard --namespace=kube-system | grep Node kubectl describe service kubernetes-dashboard --namespace=kube-system | grep Node And use the worker IP and service NodePort to reach the Dashboard. i.e. : root at w530:~ # kubectl describe pod kubernetes-dashboard --namespace=kube-system | grep Node Node: worker2/192.168.122.39 root at w530:~ # kubectl describe service kubernetes-dashboard --namespace=kube-system | grep Node Type: NodePort NodePort: 30957/TCP So: http://192.168.122.39:30957 Let us know > On Apr 4, 2017, at 10:52 AM, Vinicius Neuhauss wrote: > > I Instaled the dashboard using this documentation( https://kubernetes.io/docs/user-guide/ui/#accessing-the-dashboard-ui) in my laptop , but when i try to access the web ui I had this message: > > { > "kind": "Status", > "apiVersion": "v1", > "metadata": {}, > "status": "Failure", > "message": "no endpoints available for service \"kubernetes-dashboard\"", > "reason": "ServiceUnavailable", > "code": 503 > } > > > > jarvis:/home/neuhauss/Downloads # kubectl proxy > Starting to serve on 127.0.0.1:8001^C > jarvis:/home/neuhauss/Downloads # kubectl get pods --all-namespaces > NAMESPACE NAME READY STATUS RESTARTS AGE > kube-system kubernetes-dashboard-3203962772-nbfc5 1/1 Running 0 4h > jarvis:/home/neuhauss/Downloads # kubectl get services -a --all-namespaces > NAMESPACE NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE > default kubernetes 172.21.0.1 443/TCP 4h > kube-system kubernetes-dashboard 172.21.125.138 80:31512/TCP 4h > jarvis:/home/neuhauss/Downloads # > > > I also notice after reboot my vms , the nodes services are now duplicated. > > jarvis:/home/neuhauss/Downloads # kubectl get nodes > NAME STATUS AGE > 127.0.0.1 NotReady 4h > worker1 Ready 4h > worker1.vinicius.com NotReady 4h > worker2 Ready 4h > worker2.vinicius.com NotReady 4h > worker3 Ready 4h > worker3.vinicius.com NotReady 4h > jarvis:/home/neuhauss/Downloads # ^C > > > > ________________________________________ > From: caasp-beta-bounces at lists.suse.com [caasp-beta-bounces at lists.suse.com] on behalf of Ns, Rushi [rushi.ns at sap.com] > Sent: Sunday, April 02, 2017 12:45 PM > To: Rob Knight > Cc: caasp-beta at lists.suse.com > Subject: Re: [caasp-beta] caasp-beta > > Hi Rob, > > Yes, I tried the same and its installed, however access UI is showing unauthorized > > Also if you notice the kubernetes cluster is on https which prevents from browser (chrome or firefox) without certificates being installed . also if you notice the kubectl config has the certs information but they are not available in server side, so the only way to find those certs and install on the browser might give access. > > You can refer to this blog http://stackoverflow.com/questions/36270602/how-to-access-kubernetes-ui-via-browser > > > > server: https://lvcaasmaster:6443 > certificate-authority-data: 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 > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > From: Rob Knight > Date: Sunday, April 2, 2017 at 12:36 AM > To: "Ns, Rushi" > Cc: Alejandro Bonilla , "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] caasp-beta > > Rushi. > > I got dashboard access by following https://kubernetes.io/docs/user-guide/ui/#accessing-the-dashboard-ui > > Rob > Sent from my iPhone - please excuse any shortness > > On 2 Apr 2017, at 04:48, Ns, Rushi > wrote: > Hi Alejandro, > > Good but more issues (kubernetes dashboard issue ?unauthorized?) . Did you encounter any issues with kubernetes dashboard ? I get unauthorized when I browse https://lvcaasmaster:6443/ui > I was looking seems the certificates seems either missing ? > > Aslo were you able to deploy any applications. I tried a simple one and its not getting deployed ?? keep looking more, but let me know if you have done and how you did , so that I can check. > > > > For that particular issue as you asked it was the file ?kubelet? on every minion to add the FQDN or IP address of the minion host. > > KUBELET_HOSTNAME="lvcaasnode1" > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > From: Alejandro Bonilla > > Date: Saturday, April 1, 2017 at 8:29 PM > To: "Ns, Rushi" > > Cc: "caasp-beta at lists.suse.com" > > Subject: Re: [caasp-beta] caasp-beta > > Hi Rushi, > > Great news. > > So the certificate problem perhaps was a time mismatch of the validity due to a NTP time that is now acceptable. Then I wonder what names were in the kubelet file vs the correct hostname? Is it 'linux' or where does the mismatch come from? > > Thanks for the updates... > > > On Apr 1, 2017 11:15 PM, " Ns, Rushi " > wrote: > > Ok ?kubectl get nodes? empty issue too fixed. > > > > Basically every minion host in file /etc/kubernetes/kubelet value didn't match the hostname , so I had to add the hostname of the minion FQDN and restar the services. > > > > > > Now I get all my minions. > > > > PALM00635056A:.kube i811144$ kubectl get nodes > > NAME STATUS AGE > > lvcaasnode1 Ready 13m > > lvcaasnode2 Ready 5m > > lvcaasnode3 Ready 2m > > lvcaasnode4 Ready 1m > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > From: "Ns, Rushi" > > Date: Saturday, April 1, 2017 at 6:13 PM > To: Alejandro Bonilla > > Cc: "caasp-beta at lists.suse.com" > > Subject: Re: [caasp-beta] caasp-beta > > > > Hi Alejandro, > > > > Ok this one too fixed. > > > > Now Kubectl works with cluster-info but I don?t see any nodes , however in my setup we had 4 minions , so I expected to have the output with 4 nodes but its empty? > > > > PALM00635056A:.kube i811144$ kubectl cluster-info > > Kubernetes master is running at https://lvcaasmaster:6443 > > > > To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. > > > > > > PALM00635056A:.kube i811144$ kubectl get nodes > > Nothing > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > From: "Ns, Rushi" > > Date: Saturday, April 1, 2017 at 6:05 PM > To: Alejandro Bonilla > > Cc: "caasp-beta at lists.suse.com" > > Subject: Re: [caasp-beta] caasp-beta > > > > Hi Alejandro, > > > > Ok I have fixed it, I think it was due NTP issue. Ok its created. > > > > Now I get the certificates error after downloading the kubectl config. > > > > > > $ kubectl get nodes > > Unable to connect to the server: x509: certificate is valid for lvcaasmaster.pal.sap.corp, kubernetes.default.svc.cluster.local, not lvcaasmaster > > > > > > > > [cid:image001.png at 01D2AB24.9C6542E0] > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > From: "Ns, Rushi" > > Date: Saturday, April 1, 2017 at 11:40 AM > To: Alejandro Bonilla > > Cc: "caasp-beta at lists.suse.com" > > Subject: Re: [caasp-beta] caasp-beta > > > > Hi Alejandro, > > > > Thank you. For my setup I have proper DNS of hostname and I pretty much did as you did and I didnt hit any issues until the bootstrap cluster , the bootstrap cluster is running errors what I sent you in my first response ,, > Do you have time to go over on share screen I can show and see if we can fix this together > > > > > Best Regards, > > > > Rushi. > > Success is not a matter of being the best & winning the race. Success is a matter of handling the worst & finishing the race > > > > Sent from my iPhone > > please excuse typos and brevity > > On Apr 1, 2017, at 10:59, Alejandro Bonilla > wrote: > > Hi Rushi, > > > > I think the autoyast expects all nodes IP/DNS proper resolution. I did not use that in my first install because I don't have a setup with proper DNS... > > > > I deployed successfully and quite quickly by > > > > - Created 4 VMs > > > > - Each booted by DVD1 > > - - One was named admin for the Dashboard installer. I changed the 'linux' hostname at the 'Network' section as one would with yast lan under Hostname while on the installer. Used the Dashboard role, if I recall correctly the name of that role. > > - - Did the same with master, worker1, worker2 and set them all as the worker role. Specified the admin IP as the controller. > > > > - before installing the master and worker nodes, I finished the admin install and waited for it to boot up, it takes 10 seconds after the login prompt for the web Interface to be available. > > > > - Finished the master, workers install, they quickly showed up in the Dashboard, selected master as the, well... master. > > > > Deployment finished in less than 5 minutes. > > > > On my laptop: > > Downloaded kubeconfig, then installed > > kubernetes-client and kubernetes-common (I used them from software.opensuse.org, but there may be a more official installer.) > > > > Edit kubeconfig to ensure the master address is correct, vs a non-resolvable DN entry. > > > > mkdir ~/.kube > > cp kubeconfig ~/.kube/config > > > > Use kubectl :-) > > > > On Mar 31, 2017 11:22 PM, "Ns, Rushi" > wrote: > > Here is my beta test results. > > > > I setup total 5 systems (1 controller, 1 master, 3 workers) > > > > 1) Setup controller works fast and very quick too. > > 2) Bootstrap nodes with autoyast worked and as well manual install by selecting nodes by specifying the controller IP worked. > > 3) Install cluster with selection ran several hours and I see the following > > > > Any other tools to see whats happening other than kubelet commands I used here. > > > > lvcaasadmin:/var/lib # kubelet list > > I0401 03:58:17.465609 8571 feature_gate.go:189] feature gates: map[] > > W0401 03:58:17.465761 8571 server.go:400] No API client: no api servers specified > > I0401 03:58:17.465852 8571 docker.go:356] Connecting to docker on unix:///var/run/docker.sock > > I0401 03:58:17.465893 8571 docker.go:376] Start docker client with request timeout=2m0s > > E0401 03:58:17.467067 8571 cni.go:163] error updating cni config: No networks found in /etc/cni/net.d > > I0401 03:58:17.475120 8571 manager.go:143] cAdvisor running in container: "/user.slice" > > W0401 03:58:17.481167 8571 manager.go:151] unable to connect to Rkt api service: rkt: cannot tcp Dial rkt api service: dial tcp [::1]:15441: getsockopt: connection refused > > I0401 03:58:17.487164 8571 fs.go:117] Filesystem partitions: map[/dev/sda2:{mountpoint:/var/lib/docker/btrfs major:0 minor:34 fsType:btrfs blockSize:0}] > > I0401 03:58:17.489428 8571 manager.go:198] Machine: {NumCores:4 CpuFrequency:2297339 MemoryCapacity:33553862656 MachineID:026dbed750d34678baa318a927beb43c SystemUUID:4212E894-D404-BC7E-12C1-104406FAC1AF BootID:4fca4f86-b8df-40aa-9a52-9f32d82a65c6 Filesystems:[{Device:/dev/sda2 Capacity:105219358720 Type:vfs Inodes:0 HasInodes:true}] DiskMap:map[2:0:{Name:fd0 Major:2 Minor:0 Size:4096 Scheduler:cfq} 8:0:{Name:sda Major:8 Minor:0 Size:107374182400 Scheduler:cfq}] NetworkDevices:[{Name:eth0 MacAddress:00:50:56:92:78:da Speed:10000 Mtu:1500}] Topology:[{Id:0 Memory:33553862656 Cores:[{Id:0 Threads:[0] Caches:[]} {Id:1 Threads:[1] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]} {Id:1 Memory:0 Cores:[{Id:0 Threads:[2] Caches:[]} {Id:1 Threads:[3] Caches:[]}] Caches:[{Size:41943040 Type:Unified Level:3}]}] CloudProvider:Unknown InstanceType:Unknown InstanceID:None} > > I0401 03:58:17.490209 8571 manager.go:204] Version: {KernelVersion:4.4.52-1-default ContainerOsVersion:SUSE Container as a Service Platform 1.0 DockerVersion:1.12.6 CadvisorVersion: CadvisorRevision:} > > I0401 03:58:17.491582 8571 cadvisor_linux.go:152] Failed to register cAdvisor on port 4194, retrying. Error: listen tcp :4194: bind: address already in use > > W0401 03:58:17.494066 8571 container_manager_linux.go:205] Running with swap on is not supported, please disable swap! This will be a fatal error by default starting in K8s v1.6! In the meantime, you can opt-in to making this a fatal error by enabling --experimental-fail-swap-on. > > W0401 03:58:17.494326 8571 server.go:669] No api server defined - no events will be sent to API server. > > W0401 03:58:17.497638 8571 kubelet_network.go:69] Hairpin mode set to "promiscuous-bridge" but kubenet is not enabled, falling back to "hairpin-veth" > > I0401 03:58:17.497694 8571 kubelet.go:477] Hairpin mode set to "hairpin-veth" > > I0401 03:58:17.504274 8571 docker_manager.go:256] Setting dockerRoot to /var/lib/docker > > I0401 03:58:17.504311 8571 docker_manager.go:259] Setting cgroupDriver to cgroupfs > > I0401 03:58:17.506297 8571 server.go:770] Started kubelet v1.5.3 > > W0401 03:58:17.506331 8571 kubelet.go:1224] No api server defined - no node status update will be sent. > > E0401 03:58:17.506400 8571 server.go:481] Starting health server failed: listen tcp 127.0.0.1:10248: bind: address already in use > > E0401 03:58:17.506382 8571 kubelet.go:1145] Image garbage collection failed: unable to find data for container / > > I0401 03:58:17.506527 8571 server.go:123] Starting to listen on 0.0.0.0:10250 > > I0401 03:58:17.506647 8571 kubelet_node_status.go:204] Setting node annotation to enable volume controller attach/detach > > > > > > > F0401 03:58:17.509424 8571 server.go:148] listen tcp 0.0.0.0:10255: bind: address already in use > > > > [cid:image002.png at 01D2AB24.9C6542E0] > > [cid:image003.png at 01D2AB24.9C6542E0] > > > > > > > > from messages I see the following. > > > > > > event.go:208] Unable to write event: 'Post http://127.0.0.1:8080/api/v1/namespaces/default/events: dial tcp 127.0.0.1:8080: getsockopt: connection refused' (may retry after sleeping) > > 2017-04-01T04:01:57.375925+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.375830 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused > > 2017-04-01T04:01:57.443964+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.443871 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused > > 2017-04-01T04:01:57.444895+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:57.444801 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused > > 2017-04-01T04:01:58.376648+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.376550 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused > > 2017-04-01T04:01:58.444697+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.444601 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused > > 2017-04-01T04:01:58.446107+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:58.446008 2651 reflector.go:188] pkg/kubelet/kubelet.go:386: Failed to list *api.Node: Get http://127.0.0.1:8080/api/v1/nodes?fieldSelector=metadata.name%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused > > 2017-04-01T04:01:59.377433+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.377325 2651 reflector.go:188] pkg/kubelet/kubelet.go:378: Failed to list *api.Service: Get http://127.0.0.1:8080/api/v1/services?resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused > > 2017-04-01T04:01:59.445470+00:00 lvcaasadmin hyperkube[2651]: E0401 04:01:59.445336 2651 reflector.go:188] pkg/kubelet/config/apiserver.go:44: F > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta From kastl at b1-systems.de Tue Apr 4 15:40:10 2017 From: kastl at b1-systems.de (Johannes Kastl) Date: Tue, 4 Apr 2017 23:40:10 +0200 Subject: [caasp-beta] Zypper repository in the documentation not working Message-ID: <816c53ef-3b45-15b7-8029-605478daf9f7@b1-systems.de> Hi, the zypper repository, that is mentioned in the documentation (https://www.suse.com/betaprogram/caasp-beta/doc-bonus/#cloud-init) as an example, is not a valid repository. At least download.suse.de does not work (error in zypper and in a browser), and on download.suse.com there is no .../ibs/ directory. I guess this might be related to not having a subscription for Caas. If this is the reason, this should be pointed out in the documentation. Otherwise the example should contain a valid link... Johannes -- Johannes Kastl Linux Consultant & Trainer Tel.: +49 (0) 151 2372 5802 Mail: kastl at b1-systems.de B1 Systems GmbH Osterfeldstra?e 7 / 85088 Vohburg / http://www.b1-systems.de GF: Ralph Dehner / Unternehmenssitz: Vohburg / AG: Ingolstadt,HRB 3537 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 864 bytes Desc: OpenPGP digital signature URL: From kukuk at suse.com Tue Apr 4 15:52:02 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Tue, 4 Apr 2017 23:52:02 +0200 Subject: [caasp-beta] Zypper repository in the documentation not working In-Reply-To: <816c53ef-3b45-15b7-8029-605478daf9f7@b1-systems.de> References: <816c53ef-3b45-15b7-8029-605478daf9f7@b1-systems.de> Message-ID: <20170404215201.GA17356@suse.com> Hi, On Tue, Apr 04, Johannes Kastl wrote: > the zypper repository, that is mentioned in the documentation > (https://www.suse.com/betaprogram/caasp-beta/doc-bonus/#cloud-init) as > an example, is not a valid repository. At least download.suse.de does > not work (error in zypper and in a browser), and on download.suse.com > there is no .../ibs/ directory. > > I guess this might be related to not having a subscription for Caas. No, it is related to that this is only an exmaple. > If this is the reason, this should be pointed out in the documentation. > Otherwise the example should contain a valid link... That's not possible, since we don't know the URL of your local install server ... It is an example how to add zypp based repositories. You could add whatever you want/need. This is not an example how to get CaaSP online for free. And it is not for adding repositories, for which you have a subscription. This ones needs still be added with SUSEconnect. Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From andrew.cole at suse.com Tue Apr 4 15:59:55 2017 From: andrew.cole at suse.com (Andrew Cole) Date: Tue, 04 Apr 2017 14:59:55 -0700 Subject: [caasp-beta] issues with pxe/autoyast/cloud-init In-Reply-To: <20170404061327.GA9100@suse.com> References: <1491260190.116300.50.camel@suse.com> <20170404061327.GA9100@suse.com> Message-ID: <1491343195.27682.7.camel@suse.com> On Tue, 2017-04-04 at 08:13 +0200, Thorsten Kukuk wrote: > My suggestion: download the autoyast profile, store it somewhere else > on your install server, set a root password (Replace the "!") and > install without cloud-init configuration but the new autoyast > profile.? > Now you should be able to login at the machine and look at the log? > files, why salt-minion cannot connect with the administration > dashboard. The problem ?with salt seems to be that all minions are sending their keys with the hostname "linux". I thought the machines would generate a unique hostname during installation but it seems this has not happened. I am now trying to determine how to make the hosts generate hostnames during autoyast installation. If anyone knows the answer please let me know. Thanks Andrew From kukuk at suse.com Tue Apr 4 16:20:08 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Wed, 5 Apr 2017 00:20:08 +0200 Subject: [caasp-beta] issues with pxe/autoyast/cloud-init In-Reply-To: <1491343195.27682.7.camel@suse.com> References: <1491260190.116300.50.camel@suse.com> <20170404061327.GA9100@suse.com> <1491343195.27682.7.camel@suse.com> Message-ID: <20170404222008.GA19099@suse.com> On Tue, Apr 04, Andrew Cole wrote: > The problem ?with salt seems to be that all minions are sending their > keys with the hostname "linux". I thought the machines would generate a > unique hostname during installation but it seems this has not happened. > I am now trying to determine how to make the hosts generate hostnames > during autoyast installation. If anyone knows the answer please let me > know. Let me quote from the announcement mail: "Your DHCP server should provide resolveable hostnames. If this is not the case like with libvirt/KVM, you should consider providing one yourself by appending this kernel parameter "hostname=HOSTNAME" during installation." Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From kukuk at suse.com Wed Apr 5 00:15:30 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Wed, 5 Apr 2017 08:15:30 +0200 Subject: [caasp-beta] Antwort: Re: Antwort: Re: Antwort: Re: has realy someone tried the installation ? In-Reply-To: References: <20170404115704.GA17257@suse.com> <20170404122539.GA19199@suse.com> <20170404141726.GA19851@suse.com> Message-ID: <20170405061530.GA19535@suse.com> Hi, On Wed, Apr 05, Sebastian.Zielenski at edeka.de wrote: > Hi Thorsten, > > Lets focus the installation from scratch. In my opinion it looks like the > network stack has a problem. > Because when I try the Installation from the controller with dhcp instead of a > static configuration no ip address shows up but if use a joes Image with dhcp > during the installation everything is fine The network stack is identical on JeOS, SLES and CaaSP. > Docker ps looks like in the screenshot That's looks good. So I assume, you did install an administration node, you could connect to the dashboard and login, but the workers will not get an IP address? If yes, please try the following: Take the DVD and install a worker. Without autoyast, but full manual. On the YaST installer settings page, you select "Worker" as system role and you enter the hostname or IP of the administration dashboard node. Network: you can try the default, dhcp, and setting a static IP. If this does not work: I need a bug report with all logs from /var/log and a description of the environment. If this works and the autoyast installation does not work: I need a bug report with all logs from /var/log and the autoyast profile. Thanks, Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From aj at suse.com Wed Apr 5 01:00:49 2017 From: aj at suse.com (Andreas Jaeger) Date: Wed, 5 Apr 2017 09:00:49 +0200 Subject: [caasp-beta] Zypper repository in the documentation not working In-Reply-To: References: <816c53ef-3b45-15b7-8029-605478daf9f7@b1-systems.de> <20170404215201.GA17356@suse.com> Message-ID: On 2017-04-04 23:55, Johannes Kastl wrote: > Hi Thorsten, > > Thorsten Kukuk schrieb: > >>> If this is the reason, this should be pointed out in the >>> documentation. Otherwise the example should contain a valid >>> link... >> >> That's not possible, since we don't know the URL of your local >> install server ... > > Then change the link to example.org and add a paragraph, that in reality > the URL should point to the local install server. > > Otherwise it is pretty confusing... ;-) Could you file a bug report with the above reasoning, please? Thanks, Andreas -- Andreas Jaeger aj@{suse.com,opensuse.org} Twitter: jaegerandi SUSE LINUX GmbH, Maxfeldstr. 5, 90409 N?rnberg, Germany GF: Felix Imend?rffer, Jane Smithard, Graham Norton, HRB 21284 (AG N?rnberg) GPG fingerprint = 93A3 365E CE47 B889 DF7F FED1 389A 563C C272 A126 From kukuk at suse.com Wed Apr 5 02:24:55 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Wed, 5 Apr 2017 10:24:55 +0200 Subject: [caasp-beta] IP address of controller node is used too dynamically In-Reply-To: References: Message-ID: <20170405082455.GA2835@suse.com> Hi, On Wed, Apr 05, Thomas Schulte wrote: > When you start bootstrapping the workers, they seem to be advised to use the > controller IP which is used by the browser that accesses the webgui. That's a bug. Can you please open a bug report so that we get this fixed? > During my investigation I also noticed that the autoyast file (generated by the > controller) contains a script which sets the salt master IP on the worker. > > This IP is also dynamic and reflects the controller?s IP depending on the > browser?s request address. I assume it's using the same code. If you want to have more control about what's in the autoyast profile and maybe overwrite some values, you can use the 'create_autoyast_profile' command on the console of the administration node. Thanks, Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From Thomas.Schulte at suse.com Wed Apr 5 02:55:51 2017 From: Thomas.Schulte at suse.com (Thomas Schulte) Date: Wed, 5 Apr 2017 08:55:51 +0000 Subject: [caasp-beta] IP address of controller node is used too dynamically In-Reply-To: <20170405082455.GA2835@suse.com> References: <20170405082455.GA2835@suse.com> Message-ID: Hi, > > When you start bootstrapping the workers, they seem to be advised to > > use the controller IP which is used by the browser that accesses the webgui. > > That's a bug. Can you please open a bug report so that we get this fixed? yes, of course. I opened a bug report for this issue: https://bugzilla.suse.com/show_bug.cgi?id=1032461 > If you want to have more control about what's in the autoyast profile and maybe overwrite some values, > you can use the 'create_autoyast_profile' command on the console of the administration node. Thanks for the hint, Thorsten! I used curl/wget to download a generated profile and modified it afterwards (i.e. the root password). Regards, Thomas -----Original Message----- From: caasp-beta-bounces at lists.suse.com [mailto:caasp-beta-bounces at lists.suse.com] On Behalf Of Thorsten Kukuk Sent: Mittwoch, 5. April 2017 10:25 To: caasp-beta at lists.suse.com Subject: Re: [caasp-beta] IP address of controller node is used too dynamically Hi, On Wed, Apr 05, Thomas Schulte wrote: > When you start bootstrapping the workers, they seem to be advised to > use the controller IP which is used by the browser that accesses the webgui. That's a bug. Can you please open a bug report so that we get this fixed? > During my investigation I also noticed that the autoyast file > (generated by the > controller) contains a script which sets the salt master IP on the worker. > > This IP is also dynamic and reflects the controller?s IP depending on > the browser?s request address. I assume it's using the same code. If you want to have more control about what's in the autoyast profile and maybe overwrite some values, you can use the 'create_autoyast_profile' command on the console of the administration node. Thanks, Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta From vmoutoussamy at suse.com Wed Apr 5 06:06:47 2017 From: vmoutoussamy at suse.com (Vincent Moutoussamy) Date: Wed, 5 Apr 2017 14:06:47 +0200 Subject: [caasp-beta] Zypper repository in the documentation not working In-Reply-To: References: <816c53ef-3b45-15b7-8029-605478daf9f7@b1-systems.de> <20170404215201.GA17356@suse.com> Message-ID: ? Hi, On 5 April 2017 at 09:01:03, Andreas Jaeger (aj at suse.com(mailto:aj at suse.com)) wrote: > On 2017-04-04 23:55, Johannes Kastl wrote: > > Hi Thorsten, > > > > Thorsten Kukuk schrieb: > > > >>> If this is the reason, this should be pointed out in the > >>> documentation. Otherwise the example should contain a valid > >>> link... > >> > >> That's not possible, since we don't know the URL of your local > >> install server ... > > > > Then change the link to example.org and add a paragraph, that in reality > > the URL should point to the local install server. > > > > Otherwise it is pretty confusing... ;-) > > Could you file a bug report with the above reasoning, please? No need to fill a bug for this, I will fix the online documentation with? Johannes feedback and Thorsten explanation.? https://www.suse.com/betaprogram/caasp-beta/doc-bonus/#cloud-init Have a nice day, Regards, -- Vincent Moutoussamy SUSE Beta Program and SDK Project Manager From abonilla at suse.com Thu Apr 6 17:48:14 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Thu, 6 Apr 2017 23:48:14 +0000 Subject: [caasp-beta] Alternate kubernetes configuration (kube-master + kube-minion roles) In-Reply-To: <48AE92C8C4162E41B04A621DB14594B7037892FD@SUSHDC8002.TD.TERADATA.COM> References: <48AE92C8C4162E41B04A621DB14594B7037892FD@SUSHDC8002.TD.TERADATA.COM> Message-ID: <2892C2C5-FD68-4405-A12F-FC40C3700D5A@suse.com> Hi - I?m not going to respond on whether that is supported or not or what is our plan on this going forward considering security, routing, etc. But one could edit https://github.com/kubic-project/salt/blob/master/salt/top.sls (I don?t have my cluster with me now so look for the top.sls on the Admin? node) Make it look like 'roles:kube-master': - match: grain - kubernetes-master - flannel - docker - kubernetes-minion - reboot Then deploy from the Dashboard. You may be able to update an already running environment by doing the above and then running "salt '*? state.apply" I don?t know if this would work. Thanks, Alejandro > On Apr 6, 2017, at 7:35 PM, Love, Christopher wrote: > > The default kubernetes configuration for CaaSP is that the master node only has the kube-master role. We intend to support single-node kube clusters and in general will be installing on hardware that will be grossly underutilized if the node?s only role is that of the kube-master. > > Is there a way to change how the CaaSP control node bootstraps the cluster such that the master node has kube-master and kube-minion roles? > > Thanks! > Chris > > Chris Love > Teradata Labs Server Management > 17095 Via Del Campo > San Diego, Ca 92127 > 858.485.3011 Office > Christopher.Love at teradata.com > > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta From kukuk at suse.com Fri Apr 7 03:11:49 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Fri, 7 Apr 2017 11:11:49 +0200 Subject: [caasp-beta] Networkconfig and hostnames In-Reply-To: References: Message-ID: <20170407091149.GB3660@suse.com> On Fri, Apr 07, Sebastian.Zielenski at edeka.de wrote: > Hi, > > Is it normal that the hostname from every node looks like this dhcp_inst_XX > even if I specify a fixed IP Address and Hostname ? dhcp_inst_XX is nothing we use in our tools/configurations. This is seems to come from your network setup. > Also the fixed IP and route isn't available after the Installation on the Admin > Dashboard so I always have to updated the whole networkconfig again after the > installation. Sorry, but I don't know about what you are speaking here. The Admin Dashboard does not have any network configuration. Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From kukuk at suse.com Fri Apr 7 03:42:54 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Fri, 7 Apr 2017 11:42:54 +0200 Subject: [caasp-beta] Antwort: Re: Networkconfig and hostnames In-Reply-To: References: <20170407091149.GB3660@suse.com> Message-ID: <20170407094254.GA11574@suse.com> On Fri, Apr 07, Sebastian.Zielenski at edeka.de wrote: > Hi Thorsten, > > when I install the FIRST node I choose the role Admin Dashboard you can also > say controller if you want. > I did the whole networkconfig on the Installation and it shows also static > before the Installation starts. But after Installation Hostname isn't set to > the value I put in into the networkconfig section the same with default route > and so on. Ok, I tested this and it works fine for me without any problems. I can reproduce your problem with BOOTPROTO=dhcp and not static, but this seems to be only cosmetic, the network is setup correct. I cannot reproduce that hostname and routing goes lost. Could you please create a bug report and attach the whole /var/log directory as tar archive? Without the log files, our developers cannot find out what goes wrong here. Thanks, Thorsten > Regars > Sebastian > > Mit freundlichen Gr??en > > i.A. Sebastian Zielenski > > LUNAR GmbH > Technologie > RZ-Technologie > Serversysteme > Technologe > > New-York-Ring 6 > 22297 Hamburg > > Tel.: +49 40 6377 - 8838 > > > > > mailto:sebastian.zielenski at edeka.de > > http://www.lunar-edeka.de > > EDEKA LUNAR GmbH, Hamburg, eingetragen beim Amtsgericht Hamburg HRB 113314 > Gesch?ftsf?hrer: Christoph Diekmeyer, Sylvia Rosellen Deniz > Ein Unternehmen der EDEKA ZENTRALE AG & Co. KG > --------------------------------------------------------------------------------------------------------------------------------------------------- > > HINWEIS: Diese Nachricht ist vertraulich und nur f?r den Adressaten bestimmt. > Sollten Sie irrt?mlich diese > Nachricht erhalten haben, bitten wir um Ihre Mitteilung per E-Mail oder unter > der oben angegebenen Telefonnummer. > NOTICE: This message is confidential and may be read, copied, disseminated or > otherwise used only by the intended recipient. > Should you have received this message in error, please contact us immediately > by return e-mail or by telephone at the number above. > > > > > Von: Thorsten Kukuk > An: , > Datum: 07.04.2017 11:11 > Betreff: Re: [caasp-beta] Networkconfig and hostnames > Gesendet von: > ??????????????????????????????????????????????????????????????????????????????? > > > > On Fri, Apr 07, Sebastian.Zielenski at edeka.de wrote: > > > Hi, > > > > Is it normal that the hostname from every node looks like this dhcp_inst_XX > > even if I specify a fixed IP Address and Hostname ? > > dhcp_inst_XX is nothing we use in our tools/configurations. This is seems > to come from your network setup. > > > Also the fixed IP and route isn't available after the Installation on the > Admin > > Dashboard so I always have to updated the whole networkconfig again after the > > installation. > > Sorry, but I don't know about what you are speaking here. > The Admin Dashboard does not have any network configuration. > > > Thorsten > > -- > Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP > SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany > GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From kukuk at suse.com Mon Apr 10 06:39:44 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Mon, 10 Apr 2017 14:39:44 +0200 Subject: [caasp-beta] Cluster bootstrap never ending In-Reply-To: <14D213ED24360C4CBFADC2BA9BE26D560107B439@NWBXMB01.microfocus.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107AFDC@NWBXMB01.microfocus.com> <14D213ED24360C4CBFADC2BA9BE26D560107B439@NWBXMB01.microfocus.com> Message-ID: <20170410123944.GA4161@suse.com> On Mon, Apr 10, Steven Mustafa wrote: > OK, so this is definitely not in the documentation. Correct, but an announcement from me on this mailing list, that you need to configure something like ntp. > I checked and there are no SSH keys generated. You mean ssh keys of the host? That's impossible that none are generated if you did the installation with DVD or autoyast. Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From vmoutoussamy at suse.com Mon Apr 10 09:28:27 2017 From: vmoutoussamy at suse.com (Vincent Moutoussamy) Date: Mon, 10 Apr 2017 17:28:27 +0200 Subject: [caasp-beta] Cluster bootstrap never ending In-Reply-To: <20170410123944.GA4161@suse.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107AFDC@NWBXMB01.microfocus.com> <14D213ED24360C4CBFADC2BA9BE26D560107B439@NWBXMB01.microfocus.com> <20170410123944.GA4161@suse.com> Message-ID: ? Hi, FYI, Thorsten is referencing this message: > as you should have noticed, the administration dashboard of CaaSP generates > a certificate during the first login for communication with the cluster. > Such a certificate only works, if the date/time on all machines in the > cluster is correct. > > Our cloud-init documentation contains an example, how to configure ntpd > with cloud-init during the first boot. > If you don't want to use cloud-init, please configure ntpd yourself. > If you don't want to use ntpd, you could also use systemd-timesyncd. > For this, adjust /etc/systemd/timesyncd.conf and enable it with: > # timedatectl set-ntp true > > For Beta3 we will think about a mechanism to automatically setup > time synchronisation in the cluster. I will add this message to the known issue section? (https://www.suse.com/betaprogram/caasp-beta/#releasenotes). For inclusion of the NTP message in the ?Installation Guide?, let?s wait for the potential mechanism in Beta 3. Regards, -- Vincent Moutoussamy SUSE Beta Program and SDK Project Manager From fcastelli at suse.com Tue Apr 11 00:53:40 2017 From: fcastelli at suse.com (Flavio Castelli) Date: Tue, 11 Apr 2017 08:53:40 +0200 Subject: [caasp-beta] Cluster bootstrap never ending In-Reply-To: <14D213ED24360C4CBFADC2BA9BE26D560107AFDC@NWBXMB01.microfocus.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107AFDC@NWBXMB01.microfocus.com> Message-ID: <3affc199-80a9-db00-27e2-1bb141876b6b@suse.com> On 04/09/2017 05:56 PM, Steven Mustafa wrote: > Any suggestions on what I can do? I have yet to setup a functioning cluster. We will try to reproduce the issue locally. > All nodes were installed manually, I haven't yet tried to do the autoyast or cloudinit methods yet. In the meantime can you try to perform the deployment using the autoyast mode? Cheers Flavio From beta-programs at lists.suse.com Wed Apr 12 09:42:21 2017 From: beta-programs at lists.suse.com (SUSE Beta Program) Date: Wed, 12 Apr 2017 17:42:21 +0200 Subject: [caasp-beta] SUSE CaaSP 1.0 Beta 2 video and Mailing List tips Message-ID: <58ee4add96553_45978f5318786b9@boucane.mail> ==SUSE CaaSP 1.0 Beta 2 video and Mailing List tips =Installation video We are glad to share an installation video showing how easy it is to install and configure a SUSE Container as a Service Platform 1.0 Beta 2 Cluster. You can check it out directly via https://youtu.be/hJf6FqNQhJ4 or on our SUSE CaaSP Beta web page[1]. =Mailing List Tips Here are some general tips about our caasp-beta mailing lists: - If you recently joined the caasp-beta mailing list, consider to look at the collection of prior postings, by visiting our caasp-beta Archives[2]. - If you don't want to have your Inbox filled with caasp-beta emails, we highly recommend you to set up a mailing rule to move them into a dedicated caasp-beta email folder. - You can make a rule based on the caasp-beta at lists.suse.com recipient or on the [caasp-beta] header subject automatically add to any post on the mailing list. - New beta release announcement will always have the [ANNOUNCE] header subject. - Don't be afraid to post your finding on the caasp-beta Mailing List before opening a bug report - Don't be afraid to ask any question regarding SUSE Container as a Service Platform 1.0. Your SUSE Linux Enterprise Team ==Question? Please refer to our dedicated SUSE CaaSP Beta webpage[3] for any general information. Do not hesitate to ask any technical questions to our public mailing list caasp-beta at lists.suse.com[4] However if you have any question regarding SUSE Beta Program itself, or if you have a special or private inquiry please reach us at beta-programs at lists.suse.com You received this email because you're signed up to get updates from us. Sent an email to beta-programs at lists.suse.com if you would like to unsubscribe. Your SUSE CaaSP Team [1] https://www.suse.com/betaprogram/caasp-beta/#media [2] http://lists.suse.com/pipermail/caasp-beta/ [3] https://www.suse.com/betaprogram/caasp-beta/ [4] http://lists.suse.com/mailman/listinfo/caasp-beta -------------- next part -------------- An HTML attachment was scrubbed... URL: From abonilla at suse.com Wed Apr 12 10:08:55 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Wed, 12 Apr 2017 16:08:55 +0000 Subject: [caasp-beta] A few How-To guides coming your way Message-ID: Dear Beta Testers, As the SUSE Container as a Service Platform grows from Beta 2, I?d like to highlight how to perform certain operations that may help you understand how to utilize the Platform. Certainly, these How-Tos? do not show a unique way of managing or providing services but they will hopefully ease the learning curve. These guides: 1. will use container images that reside outside of your network. 2. are for some of us (like me) that want to understand a few options around Kubernetes. 3. do not reflect how SUSE will provide a solution, and are certainly not a commitment. Thanks, Alejandro Bonilla SUSE Technical Strategist ? North America abonilla at suse.com (484)426-7722 From abonilla at suse.com Wed Apr 12 10:20:32 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Wed, 12 Apr 2017 16:20:32 +0000 Subject: [caasp-beta] How-To: LoadBalancer - Access to Dashboard as Example Message-ID: <7B8574F8-39E0-48E7-8687-AAB0BF7A804C@suse.com> Hi Beta Testers - (Before you proceed, please refer to my previous e-mail, "A few How-To guides coming your way?) --- If you?ve deployed Beta 2 and then created a sample deployment, you?ll notice that a LoadBalancer would be nice in order to access containers easily. Clearly, doing this to access the Kubernetes Dashboard (or any other service) isn?t that nice... kubectl describe pods kubernetes-dashboard --namespace=kube-system | grep Node kubectl describe svc kubernetes-dashboard --namespace=kube-system | grep Node (Mix the IP+Port) = Dashboard URL So, I?ve just tried using a (known, good for testing) LB that is available. https://github.com/hpcloud/kubernetes-service-loadbalancer Let?s give this LoadBalancer a try, and let?s use the (upstream) Kubernetes Dashboard as an example App. 1. Deploy the Kubernetes Dashboard. kubectl create -f https://rawgit.com/kubernetes/dashboard/master/src/deploy/kubernetes-dashboard.yaml 2. Fetch the necessary files to deploy the LoadBalancer git clone https://github.com/hpcloud/kubernetes-service-loadbalancer.git 3. Enter the work directory cd kubernetes-service-loadbalancer 4. Edit the ReplicationController section and change the VIP_ALLOCATION_START and VIP_ALLOCATION_END values. (Using an IP range to expose the App - In the same network as the master/workers) vi examples/kube-loadbalancer-rc.yaml 5. And deploy the LB Controller we?ve just modified kubectl create -f examples/kube-loadbalancer-rc.yaml 6. Get the worker node names and give them the type=loadbalancer label kubectl get nodes kubectl label node worker1 type=loadbalancer kubectl label node worker2 type=loadbalancer 7. Create a configmap file to use the kube-LoadBalancer to expose the Kubernetes Dashboard and the content below (or use attached) vi examples/dashboard-configmap.yaml apiVersion: v1 kind: ConfigMap metadata: name: configmap-dashboard-svc labels: app: loadbalancer data: namespace: "kube-system" target-service-name: "kubernetes-dashboard" 8. Deploy the configmap kubectl create -f examples/dashboard-configmap.yaml 9. Get the Dashboard IP via the bind-ip kubectl get configmap configmap-dashboard-svc -o yaml 10. curl or use a Browser to open the bind-ip. Please let me know if something went wrong? or right? Thanks, Alejandro Bonilla SUSE Technical Strategist ? North America abonilla at suse.com (484)426-7722 -------------- next part -------------- A non-text attachment was scrubbed... Name: dashboard-configmap.yaml Type: application/octet-stream Size: 201 bytes Desc: dashboard-configmap.yaml URL: From abonilla at suse.com Wed Apr 12 10:27:32 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Wed, 12 Apr 2017 16:27:32 +0000 Subject: [caasp-beta] How-To: Setting Up an internal DNS Message-ID: <54982293-27F5-402E-BDBE-C44A1E3790A9@suse.com> Hi Beta Testers - (Before you proceed, please refer to my previous e-mail, "A few How-To guides coming your way?) ? In order for containers to resolve each other, a DNS needs to be in-place. There are many ways to implement this, but let?s start with what perhaps is the simplest. 1. If your network is like mine (which I think the SUSE CaaSP Beta 2 deploys on the same subnet) - the API may be running on default svc/kubernetes 172.21.0.1 443/TCP 11d 2. I have then selected 172.21.0.2 as the internal DNS address 3. Save the attached dns-addon.yaml (review it if you want to see what it?s doing) and run kubectl create -f dns-addon.yaml 4. SSH into ALL your WORKER NODES and open the kubelet config file vi /etc/kubernetes/kubelet 5. Modify 'KUEBELET_ARGS=' and add '--cluster-dns 172.21.0.2 --cluster-domain=cluster.local? - mine looks like # Add your own! KUBELET_ARGS="\ --node-ip=192.168.122.66 --cluster-dns 172.21.0.2 --cluster-domain=cluster.local \ --config=/etc/kubernetes/manifests \ --pod-infra-container-image=sles12/pause:1.0.0 \ \ --kubeconfig=/var/lib/kubelet/kubeconfig? 6. Restart kubelet (on all workers) rckubelet restart 7. Any new deployment will use the new dns-server for internal resolution (and Forward the rest). Test it: kubectl run -i -t busybox --image=busybox --restart=Never Waiting for pod default/busybox to be running, status is Pending, pod ready: false Waiting for pod default/busybox to be running, status is Pending, pod ready: false If you don't see a command prompt, try pressing enter. / # cat /etc/resolv.conf search default.svc.cluster.local svc.cluster.local cluster.local nameserver 172.21.0.2 options ndots:5 / # nslookup 172.21.0.1 Server: 172.21.0.2 Address 1: 172.21.0.2 kube-dns.kube-system.svc.cluster.local Name: 172.21.0.1 A ddress 1: 172.21.0.1 kubernetes.default.svc.cluster.local / # ping google.com PING google.com (172.217.5.238): 56 data bytes 64 bytes from 172.217.5.238: seq=0 ttl=54 time=12.060 m exit kubectl delete pod busybox Please let me know if something went wrong? or right? Thanks, -------------- next part -------------- A non-text attachment was scrubbed... Name: dns-addon.yaml Type: application/octet-stream Size: 3157 bytes Desc: dns-addon.yaml URL: From abonilla at suse.com Wed Apr 12 10:57:57 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Wed, 12 Apr 2017 16:57:57 +0000 Subject: [caasp-beta] How-To: Container Monitoring and Performance Analysis Message-ID: <4BC40727-C559-4327-B429-29C54F1DADE8@suse.com> Hi Beta Testers - (Before you proceed, please refer to my previous e-mail, "A few How-To guides coming your way?) ? We need to have some way to understand how/what our cluster is doing around resource consumption (CPU, Mem, Disk, Network, etc). One option is Heapster. Heapster enables Container Cluster Monitoring and Performance Analysis, using InfluxDB and Grafana. These steps help deploy Grafana+InfluxDB+Heapster. The Grafana Dashboard helps visualize the data collected into InfluxDB. [kube-dns is required for proper DNS resolution, an a LoadBalancer or my previous e-mail on using an LB should help to facilitate access to the dashboard] 1. Git Clone the repo that contains the config files git clone https://github.com/kubernetes/heapster.git 2. Open/modify the heapster deployment so that it uses the FQDN vs short name, as our certificates are only set for full names (Changing in an upcoming release). cd heapster vi deploy/kube-config/influxdb/heapster-deployment.yaml 3. Modify line 20 to look like - --source=kubernetes:https://kubernetes.default.svc.cluster.local 4. Deploy All the Services and Deployments kubectl create -f deploy/kube-config/influxdb/ 5. Deploy a configmap to expose ?monitoring-grafana? service via the LoadBalancer. [This depends on kube-loadbalancer-rc from a previous e-mail] Save the attached file kubectl create -f grafana-configmap-dashboard.yaml 6. Get the IP of the LoadBalancer for service ?monitoring-grafana? defined as 'grafana-configmap-dashboard-svc' kubectl get configmap grafana-configmap-dashboard-svc -o yaml 7. Access the Grafana Dashboard via the provided bind-ip: If ever asked for a username/password, it should be root:root Please let me know if anything went wrong.. or right. Thanks, Alejandro Bonilla SUSE Technical Strategist ? North America abonilla at suse.com (484)426-7722 -------------- next part -------------- A non-text attachment was scrubbed... Name: grafana-configmap-dashboard.yaml Type: application/octet-stream Size: 207 bytes Desc: grafana-configmap-dashboard.yaml URL: From abonilla at suse.com Wed Apr 12 13:30:18 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Wed, 12 Apr 2017 19:30:18 +0000 Subject: [caasp-beta] How-To: Container Monitoring and Performance Analysis In-Reply-To: <898A68089AEE874A8271E6C5950A6DF2170043D3@prvxmb02.microfocus.com> References: <4BC40727-C559-4327-B429-29C54F1DADE8@suse.com> <898A68089AEE874A8271E6C5950A6DF2170043D3@prvxmb02.microfocus.com> Message-ID: Hi Cameron, That is a nice question for our product managers. I believe that may be our intention in an upcoming release. Certainly, we?d want our customers to use containers that were built by a trusted vendor or with Dockerfiles/container images provided by a trusted source. I?d modify the traditional saying to, ?Rome wasn?t built by Beta2? Thanks, Al > On Apr 12, 2017, at 3:21 PM, Cameron Seader wrote: > > Would be nice to have these things in our own container registry. :-) > > > > Sent from my Verizon, Samsung Galaxy smartphone > > > -------- Original message -------- > From: Alejandro Bonilla > Date: 4/12/17 11:58 AM (GMT-06:00) > To: caasp-beta at lists.suse.com > Subject: [caasp-beta] How-To: Container Monitoring and Performance Analysis > > Hi Beta Testers - > > (Before you proceed, please refer to my previous e-mail, "A few How-To guides coming your way?) > > ? > > We need to have some way to understand how/what our cluster is doing around resource consumption (CPU, Mem, Disk, Network, etc). One option is Heapster. > > Heapster enables Container Cluster Monitoring and Performance Analysis, using InfluxDB and Grafana. > > These steps help deploy Grafana+InfluxDB+Heapster. The Grafana Dashboard helps visualize the data collected into InfluxDB. > [kube-dns is required for proper DNS resolution, an a LoadBalancer or my previous e-mail on using an LB should help to facilitate access to the dashboard] > > 1. Git Clone the repo that contains the config files > > git clone https://github.com/kubernetes/heapster.git > > 2. Open/modify the heapster deployment so that it uses the FQDN vs short name, as our certificates are only set for full names (Changing in an upcoming release). > > cd heapster > vi deploy/kube-config/influxdb/heapster-deployment.yaml > > 3. Modify line 20 to look like > > - --source=kubernetes:https://kubernetes.default.svc.cluster.local > > 4. Deploy All the Services and Deployments > > kubectl create -f deploy/kube-config/influxdb/ > > 5. Deploy a configmap to expose ?monitoring-grafana? service via the LoadBalancer. [This depends on kube-loadbalancer-rc from a previous e-mail] > > Save the attached file > kubectl create -f grafana-configmap-dashboard.yaml > > 6. Get the IP of the LoadBalancer for service ?monitoring-grafana? defined as 'grafana-configmap-dashboard-svc' > > kubectl get configmap grafana-configmap-dashboard-svc -o yaml > > 7. Access the Grafana Dashboard via the provided bind-ip: > > If ever asked for a username/password, it should be root:root > > Please let me know if anything went wrong.. or right. > > Thanks, > > Alejandro Bonilla > SUSE > Technical Strategist ? North America > abonilla at suse.com > (484)426-7722 From Dyon.Van-Bavel at alphabet.com Fri Apr 14 04:59:36 2017 From: Dyon.Van-Bavel at alphabet.com (Dyon.Van-Bavel at alphabet.com) Date: Fri, 14 Apr 2017 10:59:36 +0000 Subject: [caasp-beta] CaaS Beta2 OpenStack Image Message-ID: Hello @All, I?m just a bit searching and trying to find the links within all documentation available, but it seems all documentation is made for the ISO images and not for the images that are supplied. In my case I?m trying the CaaS Beta on top of OpenStack with the CaaS OpenStack qcow2 image. After booting the image not too much is running, here is where the hunt for a bit more information started, as I couldn?t find anything in the available docs I decided to start a hunt on the instance I now had and I did find: /usr/share/caasp-container-manifests/activate.sh after running this I suddenly had a dashboard (and a bunch of containers running). But here my journey continued? how to add worker notes according documentation ?Please select worker in step 3? wasn?t really a bit I could work with ? For bootstrapping the CaaS nodes I did decide to upload the ISO to OpenStack start an instance from it where I do attach bootable a volume to, install CaaS (with netsetup=dhcp autoyast=bla) from the booted Instance ISO to the volume when succesfull terminate the ISO instance detach the volume and start a new instance from this volume. I?m now wondering? Do I miss some documentation or was the ?Appliance beta? supposed to be bootstrapped as written above? Or did I miss a link somewhere? - Dyon -------------- next part -------------- An HTML attachment was scrubbed... URL: From kukuk at suse.com Tue Apr 18 07:47:37 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Tue, 18 Apr 2017 15:47:37 +0200 Subject: [caasp-beta] CaaS Beta2 OpenStack Image In-Reply-To: References: Message-ID: <20170418134737.GA7298@suse.com> Hi, On Fri, Apr 14, Dyon.Van-Bavel at alphabet.com wrote: > I?m just a bit searching and trying to find the links within all documentation > available, but it seems all documentation is made for the ISO images and not > for the images that are supplied. Yes, for the VMX images the docu isn't ready yet, but we have: https://www.suse.com/betaprogram/caasp-beta/doc-bonus/#cloud-init For the administration node, you need, as you found out already: runcmd: /usr/share/caasp-container-manifests/activate.sh For the cluster nodes, you need to configure salt minions. The master name of the salt minions is the administration node: salt_minion: conf: master: salt.example.com That's all you need. But this is only for Beta2, for Beta3 it will be different. Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From jevans at suse.com Wed Apr 19 06:49:52 2017 From: jevans at suse.com (Jason Evans) Date: Wed, 19 Apr 2017 14:49:52 +0200 Subject: [caasp-beta] Default Password for VMX Message-ID: <1492606192.8223.3.camel@suse.com> Hi all, what's the default root password for the Beta 2 VMX image? ?Thanks Jason From hari at mahadevan.net Tue Apr 18 23:28:46 2017 From: hari at mahadevan.net (Hari Mahadevan) Date: Wed, 19 Apr 2017 01:28:46 -0400 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames Message-ID: Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker Installed each VM individually booting from the iso image, using static IP address, gateway and DNS for each. After build the CaaS installer comes up with an incorrect/wierd hostname for each system Admin: ppklablinux30.localdomain Master: ppklablinux31.localdomain Worker: null-0050568c7c69 Across many other install attempts the ?null-{mac_address}? hostname seems to get used consistently. Invoking bootstrapping process from the admin website by choosing the Master runs never completes and keeps spinning ? logs on the master has name resolution failure using the incorrect hostnames Admin: /var/log/messages: 2017-04-18T14:20:46.546707+00:00 ppklablinux30 hyperkube[2882]: E0418 14:20:46.546668 2882 reflector.go:188] pkg/kubelet/config/apiserver.go:44: Failed to list *api.Pod: Get http://127.0.0.1:8080/api/v1/pods?fieldSelector=spec.nodeName%3D127.0.0.1&resourceVersion=0: dial tcp 127.0.0.1:8080: getsockopt: connection refused Master: /var/log/messages: 2017-04-18T14:20:43.569939+00:00 ppklablinux31 etcd[3937]: setting maximum number of CPUs to 1, total number of available CPUs is 1 2017-04-18T14:20:43.570085+00:00 ppklablinux31 etcd[3937]: the server is already initialized as member before, starting as etcd member... 2017-04-18T14:20:43.570230+00:00 ppklablinux31 etcd[3937]: peerTLS: cert = /etc/pki/minion.crt, key = /etc/pki/minion.key, ca = /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt, trusted-ca = /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt, client-cert-auth = false 2017-04-18T14:20:43.573012+00:00 ppklablinux31 etcd[3937]: listening for peers on https://0.0.0.0:2380 2017-04-18T14:20:43.573192+00:00 ppklablinux31 etcd[3937]: The scheme of client url http://0.0.0.0:2379 is HTTP while peer key/cert files are presented. Ignored key/cert files. 2017-04-18T14:20:43.573372+00:00 ppklablinux31 etcd[3937]: listening for client requests on 0.0.0.0:2379 2017-04-18T14:20:43.589824+00:00 ppklablinux31 etcd[3937]: failed resolving host ppklablinux31.localdomain:2380 (lookup ppklablinux31.localdomain on 170.116.12.51:53: no such host); retrying in 1s Thoughts/suggestions to fix the hostname issue? -- Hari Mahadevan 914 564 2224 (c) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: From paul.gonin at suse.com Wed Apr 19 06:54:26 2017 From: paul.gonin at suse.com (Paul Gonin) Date: Wed, 19 Apr 2017 14:54:26 +0200 Subject: [caasp-beta] Default Password for VMX In-Reply-To: <1492606192.8223.3.camel@suse.com> References: <1492606192.8223.3.camel@suse.com> Message-ID: <1492606466.13951.18.camel@suse.com> you should use cloud-init for the initial configuration during boot phase (and provision ssh key or password): https://www.suse.com/betaprogram/caasp-beta/doc-bonus/#cloud-init Le mercredi 19 avril 2017 ? 14:49 +0200, Jason Evans a ?crit?: > Hi all, what's the default root password for the Beta 2 VMX image? > ?Thanks > > Jason > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta From hari at mahadevan.net Wed Apr 19 09:36:03 2017 From: hari at mahadevan.net (Hari Mahadevan) Date: Wed, 19 Apr 2017 11:36:03 -0400 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames In-Reply-To: <77f28473-2c63-56be-3919-c832f15442e1@suse.com> References: <77f28473-2c63-56be-3919-c832f15442e1@suse.com> Message-ID: ppklablinux30-010034246250:~ # docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') bundle exec rails runner "puts Pillar.all.to_json" [{"id":1,"minion_id":null,"pillar":"certificate_information.subject_properties.O","value":"Pfizer","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017- 04-18T13:51:29.000Z"},{"id":2,"minion_id":null,"pillar":"certificate_information.subject_properties.OU","value":"BTI","created_at":"2017-04-18T13:51:29.000Z", "updated_at":"2017-04-18T13:51:29.000Z"},{"id":3,"minion_id":null,"pillar":"certificate_information.subject_properties.Email","value":"hari.mahadevan at pfizer.c om","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":4,"minion_id":null,"pillar":"certificate_information.subject_proper ties.C","value":"US","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":5,"minion_id":null,"pillar":"certificate_informati on.subject_properties.ST","value":"NY","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":6,"minion_id":null,"pillar":"cer tificate_information.subject_properties.L","value":"Pearl River","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":7,"min ion_id":null,"pillar":"dashboard","value":" ppklablinux30.pfizer.com ","created_at":"2017-04-18T13:51:30.000Z","updated_at":"2017-04-18T13:51:30.000Z"}] ppklablinux30-010034246250:~ # ppklablinux30-010034246250:~ # docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') bundle exec rails runner "puts SaltEvent.all.to_json" [{"id":1,"tag":"salt/auth","data":"{\"_stamp\": \"2017-04-18T13:14:12.208279\", \"act\": \"accept\", \"id\": \" null-0050568303b8.pfizer.com\", \"pub\": \"---- -BEGIN PUBLIC KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBb23dp3u0hEhGCCzIPg\\np2ajpBqKDkWXPjz2rfxr52sL72HaU7mvoGjNR8qTA8smuseIvwg2AtwvT0dKo4v+\\ n5g8sn9OJjLr3r7PJUnWkmUxFCgpdOgoLtL6TvsGxrxmIUvIOl/vpn0i8i7pKJ6gY\\nD2WNEfk7d+39Ptm7yEPgrbgA6TCUQYyjlJW/o/mtuBunZP0FBgeUe5zZggM7W4ix\\nFZmW9zr0Q/sscR9gHRF/jFB NPI/b+VaPbXYHxaFL0Tefg9CL/5uL1uoXk+QIU1dt\\nRXrcmUAMwmz9vBpnctn8shlZEeo5kDYahyyh/KdQeXdit7dtZ5+dCVKSz0PUX4SM\\nkwIDAQAB\\n-----END PUBLIC KEY-----\", \"result \": true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:13.000Z","processed_at":"2017-0 4-18T13:14:13.000Z","worker_id":"worker1"},{"id":2,"tag":"salt/auth","data":"{\"_stamp\": \"2017-04-18T13:14:12.227590\", \"act\": \"accept\", \"id\": \"ca\", \"pub\": \"-----BEGIN PUBLIC KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuQ+GZ/yWkJ9KqzgJnygo\\npmI6wzhDHWUfpAqiaFLNpfo57IhbwTQ1qGDX/ke9pIueyijvfN 19sKuE0GIDrIYG\\nKzcfUcXmWButHA4cm34GtaOLIbA+NzLrOL8ylUmVSpo9KqDPhRsGzY51eFBVeyt1\\nqrmgFHYE3r2HWyGfRKDVT4yETwVGE4ge5GWyhZBo85gqPzx4PMVvSfvh1bmflUdr\\nrR5yhhj stVUE54wIsZXwpXReSjNFw9I+28AX3bSamP1FuBC8sqI4qcOFerA9ULbM\\nLqIxmEe3brBxBHuiDuajZc9pHF8tPRbVYA2yAgCMvS5z/45GPkjKnguWdmUPvDKs\\nMQIDAQAB\\n-----END PUBLIC KEY- ----\", \"result\": true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:13.000Z","proce ssed_at":"2017-04-18T13:14:13.000Z","worker_id":"worker1"},{"id":3,"tag":"salt/auth","data":"{\"_stamp\": \"2017-04-18T13:14:12.255601\", \"act\": \"accept\", \"id\": \"ca\", \"pub\": \"-----BEGIN PUBLIC KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuQ+GZ/yWkJ9KqzgJnygo\\npmI6wzhDHWUfpAqiaFLNpfo57IhbwTQ1qG DX/ke9pIueyijvfN19sKuE0GIDrIYG\\nKzcfUcXmWButHA4cm34GtaOLIbA+NzLrOL8ylUmVSpo9KqDPhRsGzY51eFBVeyt1\\nqrmgFHYE3r2HWyGfRKDVT4yETwVGE4ge5GWyhZBo85gqPzx4PMVvSfvh1b mflUdr\\nrR5yhhjstVUE54wIsZXwpXReSjNFw9I+28AX3bSamP1FuBC8sqI4qcOFerA9ULbM\\nLqIxmEe3brBxBHuiDuajZc9pHF8tPRbVYA2yAgCMvS5z/45GPkjKnguWdmUPvDKs\\nMQIDAQAB\\n---- -END PUBLIC KEY-----\", \"result\": true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14 :13.000Z","processed_at":"2017-04-18T13:14:13.000Z","worker_id":"worker1"},{"id":4,"tag":"salt/auth","data":"{\"_stamp\": \"2017-04-18T13:14:12.273869\", \"ac t\": \"accept\", \"id\": \"null-0050568303b8.pfizer.com\", \"pub\": \"-----BEGIN PUBLIC KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBb23dp3u0hEhGC CzIPg\\np2ajpBqKDkWXPjz2rfxr52sL72HaU7mvoGjNR8qTA8smuseIvwg2AtwvT0dKo4v+\\n5g8sn9OJjLr3r7PJUnWkmUxFCgpdOgoLtL6TvsGxrxmIUvIOl/vpn0i8i7pKJ6gY\\nD2WNEfk7d+39Ptm7 yEPgrbgA6TCUQYyjlJW/o/mtuBunZP0FBgeUe5zZggM7W4ix\\nFZmW9zr0Q/sscR9gHRF/jFBNPI/b+VaPbXYHxaFL0Tefg9CL/5uL1uoXk+QIU1dt\\nRXrcmUAMwmz9vBpnctn8shlZEeo5kDYahyyh/KdQ eXdit7dtZ5+dCVKSz0PUX4SM\\nkwIDAQAB\\n-----END PUBLIC KEY-----\", \"result\": true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.locald omain_master","taken_at":"2017-04-18T13:14:13.000Z","processed_at":"2017-04-18T13:14:13.000Z","worker_id":"worker1"},{"id":5,"tag":"minion_start","data":"{\"_ stamp\": \"2017-04-18T13:14:14.191910\", \"pretag\": null, \"cmd\": \"_minion_event\", \"tag\": \"minion_start\", \"data\": \"Minion ca started at Tue Apr 18 13:14:14 2017\", \"id\": \"ca\"}","alter_time":"2017-04-18T13:14:14.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:18.000Z" ,"processed_at":"2017-04-18T13:14:18.000Z","worker_id":"worker1"},{"id":6,"tag":"salt/minion/ca/start","data":"{\"_stamp\": \"2017-04-18T13:14:14.201405\", \" pretag\": null, \"cmd\": \"_minion_event\", \"tag\": \"salt/minion/ca/start\", \"data\": \"Minion ca started at Tue Apr 18 13:14:14 2017\", \"id\": \"ca\"}"," alter_time":"2017-04-18T13:14:14.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:18.000Z","processed_at":"2017-04-18T13:14:1 8.000Z","worker_id":"worker1"},{"id":7,"tag":"salt/auth","data":"{\"_stamp\": \"2017-04-18T13:26:23.660263\", \"act\": \"accept\", \"id\": \"ppklablinux31\", \"pub\": \"-----BEGIN PUBLIC KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvRq1LkY//WVBG0iCfJO9\\n7a7O2HhXroisxycxfu5U99wmWMfOdQVo4arIe7N9hBo8M764/M4 WQcv2Ewozm6/t\\n3Ygy3nCcfohlwMvikcMbPgW/pxcIXfQkO68y+IbjOSjTPpvZtE3VFfpLkyZoAnkh\\no3tEJYgH+ULyiCI4NN6CgQ08rbhEkTmesRLuCfCZ0hjRJCyQDL0LUICxS+HQZPy0\\ne1TO2qvi kpOsY0AEWtg1a7KaXfn9KWaaiZvspRxqRdqI37zZwjzWItXCKIkORfP6\\ne4zZSzcI7GG1kM62yjrevNLBU+a7Z4JtOCqqc8RRUF6qiFH1/5/kRP+bDReVlWaa\\n5wIDAQAB\\n-----END PUBLIC KEY-- ---\", \"result\": true}","alter_time":"2017-04-18T13:26:23.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:26:23.000Z","proces sed_at":"2017-04-18T13:26:23.000Z","worker_id":"worker1"},{"id":8,"tag":"minion_start","data":"{\"_stamp\": \"2017-04-18T13:26:24.533314\", \"pretag\": null, \"cmd\": \"_minion_event\", \"tag\": \"minion_start\", \"data\": \"Minion ppklablinux31 started at Tue Apr 18 13:26:24 2017\", \"id\": \"ppklablinux31\"}","al ter_time":"2017-04-18T13:26:24.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:26:28.000Z","processed_at":"2017-04-18T13:26:28. 000Z","worker_id":"worker1"},{"id":9,"tag":"salt/minion/ppklablinux31/start","data":"{\"_stamp\": \"2017-04-18T13:26:24.540701\", \"pretag\": null, \"cmd\": \ "_minion_event\", \"tag\": \"salt/minion/ppklablinux31/start\", \"data\": \"Minion ppklablinux31 started at Tue Apr 18 13:26:24 2017\", \"id\": \"ppklablinux3 1\"}","alter_time":"2017-04-18T13:26:24.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:26:28.000Z","processed_at":"2017-04-18T 13:26:28.000Z","worker_id":"worker1"},{"id":10,"tag":"salt/auth","data":"{\"_stamp\": \"2017-04-18T13:48:20.141772\", \"act\": \"accept\", \"id\": \"null-0050 568c7c69.pfizer.com\", \"pub\": \"-----BEGIN PUBLIC KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx9fbcY1GOFMbmTJqOD2i\\nveCF4kySNJoQEq/ho6WxSonKI235 8wIw+wKnATDsdlpBHh7mxsLK4YJOqGRNcXZD\\nB/ZulYbEDWy7w9kQb4FAKEjui1PkwacU/f9XVsySEX8au1ZskyMnsrzjnOpOvhyX\\n37miIe3h7qAvXTUzxjyr2tor1YbpEJSoR77B31SlWwtWsTfHMnEE 7fC5JjeK2426\\n7yI5n6AKst5SkMv9R07t2NJBqp17jVZvCLEaUkjWn5CKke5MvSBRAvZPMkNt5tch\\n80D3SN0JAh4rpVT4S6SfK4IVeFZ9KV4/3PpVhrc5odcRQDryJId3mbdFx8gauJk5\\nbQIDAQAB\ \n-----END PUBLIC KEY-----\", \"result\": true}","alter_time":"2017-04-18T13:48:20.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18 T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z","worker_id":"worker1"},{"id":11,"tag":"minion_start","data":"{\"_stamp\": \"2017-04-18T13:48:20.9301 29\", \"pretag\": null, \"cmd\": \"_minion_event\", \"tag\": \"minion_start\", \"data\": \"Minion null-0050568c7c69.pfizer.com started at Tue Apr 18 13:48:20 2017\", \"id\": \" null-0050568c7c69.pfizer.com\"}","alter_time":"2017-04-18T13:48:20.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- 18T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z","worker_id":"worker1"},{"id":12,"tag":"salt/minion/ null-0050568c7c69.pfizer.com/start","data":"{\" _stamp\": \"2017-04-18T13:48:20.938113\", \"pretag\": null, \"cmd\": \"_minion_event\", \"tag\": \"salt/minion/ null-0050568c7c69.pfizer.com/start\", \"data\": \"Minion null-0050568c7c69.pfizer.com started at Tue Apr 18 13:48:20 2017\", \"id\": \"null-0050568c7c69.pfizer.com\"}","alter_time":"2017-04-18T13:48:20.000 Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z","worker_id":"worker1"},{"id" :13,"tag":"20170418135525163915","data":"{\"_stamp\": \"2017-04-18T13:55:25.165892\", \"minions\": [\"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:25.000 Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:25.000Z","processed_at":"2017-04-18T13:55:25.000Z","worker_id":"worker1"},{"id" :14,"tag":"salt/job/20170418135525163915/new","data":"{\"tgt_type\": \"glob\", \"jid\": \"20170418135525163915\", \"tgt\": \"ppklablinux31\", \"_stamp\": \"20 17-04-18T13:55:25.166238\", \"user\": \"saltapi\", \"arg\": [{\"key\": \"roles\", \"val\": [\"kube-master\"], \"__kwarg__\": true}], \"fun\": \"grains.append\ ", \"minions\": [\"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:25.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:25.0 00Z","processed_at":"2017-04-18T13:55:25.000Z","worker_id":"worker1"},{"id":15,"tag":"20170418135525237571","data":"{\"_stamp\": \"2017-04-18T13:55:25.238994\ ", \"minions\": [\"null-0050568c7c69.pfizer.com\"]}","alter_time":"2017-04-18T13:55:25.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-0 4-18T13:55:25.000Z","processed_at":"2017-04-18T13:55:25.000Z","worker_id":"worker1"},{"id":16,"tag":"salt/job/20170418135525237571/new","data":"{\"tgt_type\": \"glob\", \"jid\": \"20170418135525237571\", \"tgt\": \"null-0050568c7c69.pfizer.com\", \"_stamp\": \"2017-04-18T13:55:25.240617\", \"user\": \"saltapi\", \" arg\": [{\"key\": \"roles\", \"val\": [\"kube-minion\"], \"__kwarg__\": true}], \"fun\": \"grains.append\", \"minions\": [\"null-0050568c7c69.pfizer.com\"]}", "alter_time":"2017-04-18T13:55:25.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:25.000Z","processed_at":"2017-04-18T13:55: 25.000Z","worker_id":"worker1"},{"id":17,"tag":"salt/job/20170418135525237571/ret/ null-0050568c7c69.pfizer.com","data":"{\"fun_args\": [{\"key\": \"roles\", \ "val\": [\"kube-minion\"]}], \"jid\": \"20170418135525237571\", \"return\": {\"roles\": [\"kube-minion\"]}, \"retcode\": 0, \"success\": true, \"cmd\": \"_ret urn\", \"_stamp\": \"2017-04-18T13:55:26.092030\", \"fun\": \"grains.append\", \"id\": \"null-0050568c7c69.pfizer.com\"}","alter_time":"2017-04-18T13:55:26.00 0Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:30.000Z","processed_at":"2017-04-18T13:55:30.000Z","worker_id":"worker1"},{"id ":18,"tag":"salt/job/20170418135525163915/ret/ppklablinux31","data":"{\"fun_args\": [{\"key\": \"roles\", \"val\": [\"kube-master\"]}], \"jid\": \"20170418135 525163915\", \"return\": {\"roles\": [\"kube-master\"]}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:26.105903\", \"fun\": \"grains.append\", \"id\": \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:26.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"201 7-04-18T13:55:30.000Z","processed_at":"2017-04-18T13:55:30.000Z","worker_id":"worker1"},{"id":19,"tag":"salt/run/20170418135525317500/new","data":"{\"fun\": \ "runner.state.orchestrate\", \"fun_args\": [{\"mods\": \"orch.kubernetes\"}], \"jid\": \"20170418135525317500\", \"user\": \"saltapi\", \"_stamp\": \"2017-04- 18T13:55:28.242578\"}","alter_time":"2017-04-18T13:55:28.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:30.000Z","processed _at":"2017-04-18T13:55:30.000Z","worker_id":"worker1"},{"id":20,"tag":"20170418135531035630","data":"{\"_stamp\": \"2017-04-18T13:55:31.035957\", \"minions\": [\"ca\", \"null-0050568303b8.pfizer.com\", \" null-0050568c7c69.pfizer.com\", \"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklab linux30.localdomain_master","taken_at":"2017-04-18T13:55:35.000Z","processed_at":"2017-04-18T13:55:35.000Z","worker_id":"worker1"},{"id":21,"tag":"salt/job/20 170418135531035630/new","data":"{\"tgt_type\": \"glob\", \"jid\": \"20170418135531035630\", \"tgt\": \"*\", \"_stamp\": \"2017-04-18T13:55:31.036328\", \"user \": \"root\", \"arg\": [], \"fun\": \"mine.update\", \"minions\": [\"ca\", \" null-0050568303b8.pfizer.com\", \"null-0050568c7c69.pfizer.com\", \"ppklablinux31 \"]}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:35.000Z","processed_at":"2017-04-18T 13:55:36.000Z","worker_id":"worker1"},{"id":22,"tag":"salt/job/20170418135531035630/ret/ca","data":"{\"fun_args\": [], \"jid\": \"20170418135531035630\", \"re turn\": null, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:31.081600\", \"fun\": \"mine.update\", \"id\": \"ca\"}", "alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55: 36.000Z","worker_id":"worker1"},{"id":23,"tag":"salt/job/20170418135531035630/ret/ null-0050568c7c69.pfizer.com","data":"{\"fun_args\": [], \"jid\": \"20170418 135531035630\", \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:31.616291\", \"fun\": \"mine.update\ ", \"id\": \"null-0050568c7c69.pfizer.com\"}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13 :55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_id":"worker1"},{"id":24,"tag":"salt/job/20170418135531035630/ret/ppklablinux31","data":"{\"fun_ args\": [], \"jid\": \"20170418135531035630\", \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:31.63 5163\", \"fun\": \"mine.update\", \"id\": \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at ":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_id":"worker1"},{"id":25,"tag":"20170418135536062539","data":"{\"_stamp\": \"201 7-04-18T13:55:36.064042\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:55:36.000Z","master_id":"ppklablinux30.localdomain_ma ster","taken_at":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_id":"worker1"},{"id":26,"tag":"salt/job/20170418135536062539/new ","data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135536062539\", \"tgt\": [\"null-0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:55:36.064366\", \"user\": \"root\", \"arg\": [\"20170418135531035630\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017 -04-18T13:55:36.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_i d":"worker1"},{"id":27,"tag":"20170418135546241343","data":"{\"_stamp\": \"2017-04-18T13:55:46.241646\", \"minions\": [\"ca\", \" null-0050568303b8.pfizer.com\ ", \" null-0050568c7c69.pfizer.com\", \"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2 017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"worker1"},{"id":28,"tag":"salt/job/20170418135546241343/new","data":"{\"tgt_ty pe\": \"glob\", \"jid\": \"20170418135546241343\", \"tgt\": \"*\", \"_stamp\": \"2017-04-18T13:55:46.242055\", \"user\": \"root\", \"arg\": [], \"fun\": \"sal tutil.refresh_pillar\", \"minions\": [\"ca\", \"null-0050568303b8.pfizer.com\", \"null-0050568c7c69.pfizer.com\", \"ppklablinux31\"]}","alter_time":"2017-04-1 8T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"w orker1"},{"id":29,"tag":"salt/job/20170418135546241343/ret/ null-0050568c7c69.pfizer.com","data":"{\"fun_args\": [], \"jid\": \"20170418135546241343\", \"retur n\": true, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:46.303253\", \"fun\": \"saltutil.refresh_pillar\", \"id\": \"null-0050568c7c69.pfizer.com\"}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:46.000Z ","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"worker1"},{"id":30,"tag":"salt/job/20170418135546241343/ret/ppklablinux31","data":"{\"fun_args\": [], \"jid\": \"20170418135546241343\", \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:46.308953\", \"f un\": \"saltutil.refresh_pillar\", \"id\": \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_a t":"2017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"worker1"},{"id":31,"tag":"salt/job/20170418135546241343/ret/ca","data":"{ \"fun_args\": [], \"jid\": \"20170418135546241343\", \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55 :46.533656\", \"fun\": \"saltutil.refresh_pillar\", \"id\": \"ca\"}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","t aken_at":"2017-04-18T13:55:51.000Z","processed_at":"2017-04-18T13:55:51.000Z","worker_id":"worker1"},{"id":32,"tag":"20170418135551309779","data":"{\"_stamp\" : \"2017-04-18T13:55:51.311099\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:55:51.000Z","master_id":"ppklablinux30.localdo main_master","taken_at":"2017-04-18T13:55:51.000Z","processed_at":"2017-04-18T13:55:51.000Z","worker_id":"worker1"},{"id":33,"tag":"salt/job/20170418135551309 779/new","data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135551309779\", \"tgt\": [\"null-0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:55:51.31 1436\", \"user\": \"root\", \"arg\": [\"20170418135546241343\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time ":"2017-04-18T13:55:51.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:51.000Z","processed_at":"2017-04-18T13:55:51.000Z","w orker_id":"worker1"},{"id":34,"tag":"20170418135601489588","data":"{\"_stamp\": \"2017-04-18T13:56:01.489905\", \"minions\": [\"ca\", \"null-0050568303b8.pfiz er.com\"]}","alter_time":"2017-04-18T13:56:01.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:01.000Z","processed_at":"2017- 04-18T13:56:01.000Z","worker_id":"worker1"},{"id":35,"tag":"salt/job/20170418135601489588/new","data":"{\"tgt_type\": \"grain\", \"jid\": \"201704181356014895 88\", \"tgt\": \"roles:ca\", \"_stamp\": \"2017-04-18T13:56:01.492098\", \"user\": \"root\", \"arg\": [{\"queue\": false, \"concurrent\": false, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.highstate\", \"minions\": [\"ca\", \" null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:01.000 Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:01.000Z","processed_at":"2017-04-18T13:56:01.000Z","worker_id":"worker1"},{"id" :36,"tag":"20170418135606552474","data":"{\"_stamp\": \"2017-04-18T13:56:06.552868\", \"minions\": [\"ca\", \" null-0050568303b8.pfizer.com\"]}","alter_time":" 2017-04-18T13:56:06.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:06.000Z","processed_at":"2017-04-18T13:56:06.000Z","work er_id":"worker1"},{"id":37,"tag":"salt/job/20170418135606552474/new","data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135606552474\", \"tgt\": [\"ca\", \"n ull-0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:56:06.553728\", \"user\": \"root\", \"arg\": [\"20170418135601489588\"], \"fun\": \"saltutil.find_ job\", \"minions\": [\"ca\", \"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:06.000Z","master_id":"ppklablinux30.localdomain_master","taken _at":"2017-04-18T13:56:06.000Z","processed_at":"2017-04-18T13:56:06.000Z","worker_id":"worker1"},{"id":38,"tag":"salt/job/20170418135606552474/ret/ca","data": "{\"fun_args\": [\"20170418135601489588\"], \"jid\": \"20170418135606552474\", \"return\": {\"tgt_type\": \"grain\", \"jid\": \"20170418135601489588\", \"tgt\ ": \"roles:ca\", \"pid\": 86, \"ret\": \"\", \"user\": \"root\", \"arg\": [{\"queue\": false, \"concurrent\": false, \"saltenv\": \"base\", \"__kwarg__\": tru e}], \"fun\": \"state.highstate\"}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:56:06.608556\", \"fun\": \"saltutil.f ind_job\", \"id\": \"ca\"}","alter_time":"2017-04-18T13:56:06.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:06.000Z","proc essed_at":"2017-04-18T13:56:06.000Z","worker_id":"worker1"},{"id":39,"tag":"salt/job/20170418135601489588/ret/ca","data":"{\"fun_args\": [{\"queue\": false, \ "concurrent\": false, \"saltenv\": \"base\"}], \"jid\": \"20170418135601489588\", \"return\": {\"file_|-/etc/pki/issued_certs_|-/etc/pki/issued_certs_|-direct ory\": {\"comment\": \"Directory /etc/pki/issued_certs updated\", \"pchanges\": {\"/etc/pki/issued_certs\": {\"directory\": \"new\"}}, \"name\": \"/etc/pki/is sued_certs\", \"start_time\": \"13:56:07.194634\", \"result\": true, \"duration\": 1.281, \"__run_num__\": 6, \"changes\": {\"/etc/pki/issued_certs\": \"New D ir\"}, \"__id__\": \"/etc/pki/issued_certs\"}, \"group_|-kube_group_|-kube_|-present\": {\"comment\": \"New group kube created\", \"name\": \"kube\", \"start_ time\": \"13:56:03.585602\", \"result\": true, \"duration\": 492.98, \"__run_num__\": 2, \"changes\": {\"passwd\": \"x\", \"gid\": 492, \"name\": \"kube\", \" members\": []}, \"__id__\": \"kube_group\"}, \"file_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-managed\": {\"comment\": \"File /etc/pki/ca.crt exists with proper p ermissions. No changes made.\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.521611\", \"result\": true, \"duration\": 0.817, \ "__run_num__\": 10, \"changes\": {}, \"__id__\": \"/etc/pki/ca.crt\"}, \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-manage d\": {\"comment\": \"File /etc/zypp/repos.d/containers.repo updated\", \"pchanges\": {}, \"name\": \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13 :56:03.255349\", \"result\": true, \"duration\": 162.91, \"__run_num__\": 0, \"changes\": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zyp p/repos.d/containers.repo\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchanges\": {}, \"na me\": \"/etc/pki\", \"start_time\": \"13:56:07.193414\", \"result\": true, \"duration\": 1.082, \"__run_num__\": 5, \"changes\": {}, \"__id__\": \"/etc/pki\"} , \"file_|-/etc/motd_|-/etc/motd_|-managed\": {\"comment\": \"File /etc/motd updated\", \"pchanges\": {}, \"name\": \"/etc/motd\", \"start_time\": \"13:56:03. 418415\", \"result\": true, \"duration\": 145.221, \"__run_num__\": 1, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -0,0 +1,3 @@\\n+Welcome to ppklablinux30.loc aldomain.\\n+The roles of this node are:\\n+ - ca\\n\"}, \"__id__\": \"/etc/motd\"}, \"x509_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-certificate_managed\": {\"c omment\": \"File /etc/pki/ca.crt updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.483311\", \"result\": true, \"duration \": 38.149, \"__run_num__\": 9, \"changes\": {\"Certificate\": {\"New\": {\"Not After\": \"2027-04-16 13:56:08\", \"X509v3 Extensions\": {\"subjectKeyIdentifi er\": \"51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\", \"keyUsage\": \"critical Certificate Sign, CRL Sign\", \"authorityKeyIdentifier\": \"ke yid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.m ahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": \"critical CA:TRUE\"}, \"Subject Hash\": \"2F:0B:83:D6\", \"MD5 Finge r Print\": \"A5:99:B1:1C:A3:48:E9:64:86:35:24:7F:41:1F:00:90\", \"SHA1 Finger Print\": \"20:2A:25:0D:0B:2F:91:E8:3F:92:F3:2B:7F:8A:C5:37:F1:1E:15:09\", \"SHA- 256 Finger Print\": \"BF:C2:6C:31:46:B9:50:13:A2:E7:AD:BF:54:5E:FB:E5:C2:4C:E1:38:5A:0A:80:BC:AD:FC:79:92:24:E8:A8:97\", \"Serial Number\": \"F1:3D:64:29:EA:0 9:37:80\", \"Version\": 3, \"Key Size\": 4096, \"Public Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UIXB43n \\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ng8cvSHNvUx6f6R1tTbw/a SsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuT QOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhk UdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN792kR823ed734CmUvl3hEe AlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END PUBLIC KEY-----\\n\", \"Subject\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \" hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \ "None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-18 13:56:08\", \"Issuer\": {\"C\": \"US\", \"organizationName\": \"Pfiz er\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\ ", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/ca.crt does not exist.\"}}, \"__id__\": \"/etc/pki/ca.crt\"}, \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\ ": {\"comment\": \"Package python-M2Crypto is already installed\", \"name\": \"python-M2Crypto\", \"start_time\": \"13:56:06.872964\", \"result\": true, \"dur ation\": 320.254, \"__run_num__\": 4, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, \"x509_|-/etc/pki/ca.key_|-/etc/pki/ca.key_|-private_key_managed\": { \"comment\": \"File /etc/pki/ca.key updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", \"start_time\": \"13:56:07.198826\", \"result\": true, \"durat ion\": 1282.75, \"__run_num__\": 7, \"changes\": \"New private key generated\", \"__id__\": \"/etc/pki/ca.key\"}, \"file_|-/etc/pki/ca.key_|-/etc/pki/ca.key_| -managed\": {\"comment\": \"\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", \"start_time\": \"13:56:08.481733\", \"result\": true, \"duration\": 1.035, \ "__run_num__\": 8, \"changes\": {\"mode\": \"0600\"}, \"__id__\": \"/etc/pki/ca.key\"}, \"user_|-kube_user_|-kube_|-present\": {\"comment\": \"New user kube c reated\", \"name\": \"kube\", \"start_time\": \"13:56:04.094251\", \"result\": true, \"duration\": 602.999, \"__run_num__\": 3, \"changes\": {\"shell\": \"/bi n/bash\", \"workphone\": \"\", \"uid\": 1000, \"passwd\": \"x\", \"roomnumber\": \"\", \"gid\": 100, \"groups\": [\"kube\", \"users\"], \"home\": \"\", \"full name\": \"\", \"homephone\": \"\", \"name\": \"kube\"}, \"__id__\": \"kube_user\"}, \"module_|-mine.send_|-mine.send_|-run\": {\"comment\": \"Module function mine.send executed\", \"name\": \"mine.send\", \"start_time\": \"13:56:08.526443\", \"result\": true, \"duration\": 522.106, \"__run_num__\": 11, \"changes\": {\"ret\": true}, \"__id__\": \"mine.send\"}}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:56:09.056508\", \"fun\": \ "state.highstate\", \"id\": \"ca\", \"out\": \"highstate\"}","alter_time":"2017-04-18T13:56:09.000Z","master_id":"ppklablinux30.localdomain_master","taken_at" :"2017-04-18T13:56:11.000Z","processed_at":"2017-04-18T13:56:11.000Z","worker_id":"worker1"},{"id":40,"tag":"20170418135616772289","data":"{\"_stamp\": \"2017 -04-18T13:56:16.772711\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:16.000Z","master_id":"ppklablinux30.localdomain_mas ter","taken_at":"2017-04-18T13:56:21.000Z","processed_at":"2017-04-18T13:56:21.000Z","worker_id":"worker1"},{"id":41,"tag":"salt/job/20170418135616772289/new" ,"data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135616772289\", \"tgt\": [\"null-0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:56:16.773239\", \"user\": \"root\", \"arg\": [\"20170418135601489588\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017- 04-18T13:56:16.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:21.000Z","processed_at":"2017-04-18T13:56:21.000Z","worker_id ":"worker1"},{"id":42,"tag":"20170418135626951275","data":"{\"_stamp\": \"2017-04-18T13:56:26.951551\", \"minions\": [\"ppklablinux31\", \"null-0050568303b8.p fizer.com\"]}","alter_time":"2017-04-18T13:56:26.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:31.000Z","processed_at":"20 17-04-18T13:56:31.000Z","worker_id":"worker1"},{"id":43,"tag":"salt/job/20170418135626951275/new","data":"{\"tgt_type\": \"grain\", \"jid\": \"201704181356269 51275\", \"tgt\": \"roles:kube-master\", \"_stamp\": \"2017-04-18T13:56:26.953461\", \"user\": \"root\", \"arg\": [\"repositories,etcd-discovery\", {\"queue\" : false, \"concurrent\": false, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\", \"minions\": [\"ppklablinux31\", \"null-0050568303b8.pfi zer.com\"]}","alter_time":"2017-04-18T13:56:26.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:31.000Z","processed_at":"2017 -04-18T13:56:31.000Z","worker_id":"worker1"},{"id":44,"tag":"salt/job/20170418135626951275/ret/ppklablinux31","data":"{\"fun_args\": [\"repositories,etcd-disc overy\", {\"queue\": false, \"concurrent\": false, \"saltenv\": \"base\"}], \"jid\": \"20170418135626951275\", \"return\": {\"cmd_|-set_size_|-curl -L -X PUT http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size -d value=1_|-run\": {\"comment\": \"Command \\\"curl -L -X PUT http://ppklablinux 30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size -d value=1\\\" run\", \"name\": \"curl -L -X PUT http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd /registry/k8s/_config/size -d value=1\", \"start_time\": \"13:56:31.855687\", \"result\": true, \"duration\": 80.902, \"__run_num__\": 4, \"changes\": {\"pid\ ": 3252, \"retcode\": 0, \"stderr\": \" % Total % Received % Xferd Average Speed Time Time Time Current\\n Dloa d Upload Total Spent Left Speed\\n\\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\\r100 121 100 114 100 7 7709 473 --:--:-- --:--:-- --:--:-- 8142\", \"stdout\": \"{\\\"action\\\":\\\"set\\\",\\\"node\\\":{\\\"key\\\":\\\"/_etcd/registry/k8s/_config/size\\\ ",\\\"value\\\":\\\"1\\\",\\\"modifiedIndex\\\":6,\\\"createdIndex\\\":6}}\"}, \"__id__\": \"set_size\"}, \"pkg_|-cleanup_|-etcdctl_|-installed\": {\"comment\ ": \"Package etcdctl is already installed\", \"name\": \"etcdctl\", \"start_time\": \"13:56:30.443368\", \"result\": true, \"duration\": 481.147, \"__run_num_ _\": 1, \"changes\": {}, \"__id__\": \"cleanup\"}, \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": {\"comment\": \ "File /etc/zypp/repos.d/containers.repo updated\", \"pchanges\": {}, \"name\": \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13:56:27.452640\", \"r esult\": true, \"duration\": 196.93, \"__run_num__\": 0, \"changes\": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zypp/repos.d/containers .repo\"}, \"cmd_|-cleanup_|-etcdctl --endpoint= http://ppklablinux30.pfizer.com:2379 rm -r /_etcd/registry/k8s_|-run\": {\"comment\": \"check_cmd determined th e state succeeded\", \"name\": \"etcdctl --endpoint= http://ppklablinux30.pfizer.com:2379 rm -r /_etcd/registry/k8s\", \"start_time\": \"13:56:30.943924\", \"_ _id__\": \"cleanup\", \"duration\": 897.534, \"__run_num__\": 2, \"changes\": {\"pid\": 3246, \"retcode\": 4, \"stderr\": \"Error: dial tcp [::1]:2379: getso ckopt: connection refused\", \"stdout\": \"\"}, \"result\": true}, \"pkg_|-set_size_|-curl_|-installed\": {\"comment\": \"Package curl is already installed\", \"name\": \"curl\", \"start_time\": \"13:56:31.841690\", \"result\": true, \"duration\": 13.602, \"__run_num__\": 3, \"changes\": {}, \"__id__\": \"set_size\ "}}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:56:31.950017\", \"fun\": \"state.sls\", \"id\": \"ppklablinux31\", \ "out\": \"highstate\"}","alter_time":"2017-04-18T13:56:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:36.000Z","processe d_at":"2017-04-18T13:56:36.000Z","worker_id":"worker1"},{"id":45,"tag":"20170418135632056163","data":"{\"_stamp\": \"2017-04-18T13:56:32.056452\", \"minions\" : [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:36. 000Z","processed_at":"2017-04-18T13:56:36.000Z","worker_id":"worker1"},{"id":46,"tag":"salt/job/20170418135632056163/new","data":"{\"tgt_type\": \"list\", \"j id\": \"20170418135632056163\", \"tgt\": [\"null-0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:56:32.056818\", \"user\": \"root\", \"arg\": [\"20170 418135626951275\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:32.000Z","master_id":"ppk lablinux30.localdomain_master","taken_at":"2017-04-18T13:56:36.000Z","processed_at":"2017-04-18T13:56:36.000Z","worker_id":"worker1"},{"id":47,"tag":"20170418 135642239202","data":"{\"_stamp\": \"2017-04-18T13:56:42.239530\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:42.000Z"," master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:46.000Z","processed_at":"2017-04-18T13:56:46.000Z","worker_id":"worker1"},{"id":48, "tag":"salt/job/20170418135642239202/new","data":"{\"tgt_type\": \"grain\", \"jid\": \"20170418135642239202\", \"tgt\": \"roles:etcd\", \"_stamp\": \"2017-04- 18T13:56:42.241642\", \"user\": \"root\", \"arg\": [{\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.hi ghstate\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:42.000Z","master_id":"ppklablinux30.localdomain_master","taken_at" :"2017-04-18T13:56:46.000Z","processed_at":"2017-04-18T13:56:46.000Z","worker_id":"worker1"},{"id":49,"tag":"20170418135647339774","data":"{\"_stamp\": \"2017 -04-18T13:56:47.340292\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:47.000Z","master_id":"ppklablinux30.localdomain_mas ter","taken_at":"2017-04-18T13:56:51.000Z","processed_at":"2017-04-18T13:56:51.000Z","worker_id":"worker1"},{"id":50,"tag":"salt/job/20170418135647339774/new" ,"data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135647339774\", \"tgt\": [\"null-0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:56:47.340837\", \"user\": \"root\", \"arg\": [\"20170418135642239202\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017- 04-18T13:56:47.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:51.000Z","processed_at":"2017-04-18T13:56:51.000Z","worker_id ":"worker1"},{"id":51,"tag":"20170418135657522690","data":"{\"_stamp\": \"2017-04-18T13:56:57.523922\", \"minions\": [\"null-0050568c7c69.pfizer.com\", \"ppkl ablinux31\", \" null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:57.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18 T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":52,"tag":"salt/job/20170418135657522690/new","data":"{\"tgt_type\": \"g rain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": \"roles:kube-(master|minion)\", \"_stamp\": \"2017-04-18T13:56:57.525807\", \"user\": \"root\", \"arg \": [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\", \"minions\": [\" null-0050568c7c69.pfizer.com\", \"ppklablinux31\", \" null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:56:57.000Z","master_id":"ppklablinux30.l ocaldomain_master","taken_at":"2017-04-18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":53,"tag":"20170418135700403535 ","data":"{\"_stamp\": \"2017-04-18T13:57:00.404046\", \"minions\": [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_ master","taken_at":"2017-04-18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":54,"tag":"salt/job/20170418135700403535/n ew","data":"{\"tgt_type\": \"glob\", \"jid\": \"20170418135700403535\", \"tgt\": \"ca\", \"_stamp\": \"2017-04-18T13:57:00.404541\", \"user\": \"root\", \"arg \": [{\"signing_policy\": \"minion\", \"public_key\": \"-----BEGIN PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGX OCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+ph lBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCc L1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+ B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2s eUdGCmPTyLmhY90TmUMCAwEAAQ==-----END PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\ ": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, digitalSignature, keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \" GN\": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": \" hari.mahadevan at pfizer.com\", \"basicConstraints\": \"critical CA:false\"}], \"fun\": \"x509.s ign_remote_certificate\", \"minions\": [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-1 8T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":55,"tag":"salt/job/20170418135700403535/ret/ca","data":"{\"fun_args\": [{\"signing_policy\": \"minion\", \"public_key\": \"-----BEGIN PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGXOCH k0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBN rdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1x Uy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43 m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2seUd GCmPTyLmhY90TmUMCAwEAAQ==-----END PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, digitalSignature, keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \"GN\ ": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": \" hari.mahadevan at pfizer.com\", \"basicConstraints\": \"critical CA:false\"}], \"jid\": \"201704181 35700403535\", \"return\": {\"Issuer Public Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UIXB43n\\nu/72U7XYV Pk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E 1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWK r7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk 2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN792kR823ed734CmUvl3hEeAlddNBtIhJij 1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END PUBLIC KEY-----\\n\", \"Not After\": \"2017-07-27 13:57:00\", \"Subject Hash\": \"03: 5E:85:4C\", \"Public Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBE\\nuXGuonX5+UGXOCHk0qj8onDaXX8acbDl Ncc+9JLOaMWEDgRn+4skZArYcbruEI1k\\nqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\nStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSS NPNtt9qu\\n7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQS\\npYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\nXqDAVDCcL1xUy 7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACG\\nIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\nXp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y +B43m3RZY3I0njhBqEqEINRZ6T/\\nK/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t 0E2\\nTt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n-----END PUBLIC KEY-----\\n\", \"MD5 Finger Print\": \"CF:98:45:78:E6:98:66:F5:7F:9C:EC:C3:24:A6:9D:75\", \"SHA1 Fing er Print\": \"35:54:DD:18:6B:B8:0A:7A:6B:E7:BC:08:F5:FD:A7:83:DB:01:9B:E7\", \"SHA-256 Finger Print\": \"35:E1:80:2E:BE:78:50:56:5C:42:EA:49:26:ED:33:6A:33:B0 :03:E6:5C:4F:23:34:A4:3C:6B:29:E6:DA:50:BA\", \"Serial Number\": \"E0:7E:3D:AB:59:B6:BC:7C\", \"Version\": 3, \"Key Size\": 4096, \"X509v3 Extensions\": {\"su bjectKeyIdentifier\": \"FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\", \"keyUsage\": \"critical Key Encipherment\", \"authorityKeyIdentifier\" : \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress= hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": \"critical CA:FALSE\"}, \"Subject\": {\"C\": \"US\", \"organiza tionName\": \"Pfizer\", \"CN\": \"ppklablinux31.localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\" : \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-18 13:57:00\", \"Issuer\": {\"C\": \"US\", \" organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"No ne\", \"surname\": \"None\", \"OU\": \"BTI\"}}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:00.502166\", \"fun\": \"x509.sign_remote_certificate\", \"id\": \"ca\"}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- 18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":56,"tag":"20170418135700795320","data":"{\"_stamp\": \"2017-04-18T13: 57:00.795617\", \"minions\": [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:01 .000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":57,"tag":"salt/job/20170418135700795320/new","data":"{\"tgt_type\": \"glob\", \" jid\": \"20170418135700795320\", \"tgt\": \"ca\", \"_stamp\": \"2017-04-18T13:57:00.796050\", \"user\": \"root\", \"arg\": [{\"signing_policy\": \"minion\", \ "public_key\": \"-----BEGIN PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4s kZArYcbruEI1kqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfD wCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CU mZA/j/zWwok/fcACGIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2S QT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==-----END PU BLIC KEY-----\", \"C\": \"US\", \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUs age\": \"nonRepudiation, digitalSignature, keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Emai l\": \" hari.mahadevan at pfizer.com\", \"basicConstraints\": \"critical CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": [\"ca\"]}","alter_t ime":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z" ,"worker_id":"worker1"},{"id":58,"tag":"salt/job/20170418135700795320/ret/ca","data":"{\"fun_args\": [{\"signing_policy\": \"minion\", \"public_key\": \"----- BEGIN PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjme E0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+ CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtG yq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPs DP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==-----END PUBLIC KEY-----\", \"C\" : \"US\", \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiatio n, digitalSignature, keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Email\": \"hari.mahadevan@ pfizer.com\", \"basicConstraints\": \"critical CA:false\"}], \"jid\": \"20170418135700795320\", \"return\": \"-----BEGIN CERTIFICATE-----\\nMIIHFTCCBP2gAwIBAg IJAMvg3ZLcfvbyMA0GCSqGSIb3DQEBCwUAMIGtMQswCQYD\\nVQQGEwJVUzEUMBIGA1UEAwwLbG9jYWxkb21haW4xFDASBgNVBAcMC1BlYXJsIFJp\\ndmVyMQswCQYDVQQIDAJOWTEPMA0GA1UECgwGUGZpem VyMQ0wCwYDVQQqDAROb25l\\nMQwwCgYDVQQLDANCVEkxKDAmBgkqhkiG9w0BCQEWGWhhcmkubWFoYWRldmFuQHBm\\naXplci5jb20xDTALBgNVBAQMBE5vbmUwHhcNMTcwNDE4MTM1NzAwWhcNMTcwNzI3\\ nMTM1NzAwWjCBuzELMAkGA1UEBhMCVVMxIjAgBgNVBAMMGXBwa2xhYmxpbnV4MzEu\\nbG9jYWxkb21haW4xFDASBgNVBAcMC1BlYXJsIFJpdmVyMQswCQYDVQQIDAJOWTEP\\nMA0GA1UECgwGUGZpemVyMQ0 wCwYDVQQqDAROb25lMQwwCgYDVQQLDANCVEkxKDAm\\nBgkqhkiG9w0BCQEWGWhhcmkubWFoYWRldmFuQHBmaXplci5jb20xDTALBgNVBAQM\\nBE5vbmUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoI CAQDM/FldJgEHX23i\\n0kaMcES5ca6idfn5QZc4IeTSqPyicNpdfxpxsOU1xz70ks5oxYQOBGf7iyRkCthx\\nuu4QjWSo9TnMyOZ4TRTGoHAAAmk6zAeJTcGrbyWmZd0dcjZdWpNtJWlZN+axItLM\\nnPrb 999K0JzZAUf39TG12VDa2R0i7AQXgh6RGJvuUReGcv6mGUE2t1Rl4nge1JI0\\n82232q7uNF8WyCvJc0gBu18PAJxX0USGKrG+BjsJ+nS734I2lnZVzqQdY6TQ1Ree\\nuRrwpBKlidl6rZnT//tx8VRUP5sE iKyHTrtq6Q9Uc0d19hqybMEcNy1gM5Omc8FT\\n6FyD+PFeoMBUMJwvXFTLuzgO92IPh5BBqDnWZlJi2nMYUQraqvbcJSZkD+P/NbCi\\nT99wAIYggK0bKrT+hWesrYBcEBWHnVUAf42eO5BYP8fL4Zyp2Av2 r8YLT6dx2v6J\\nPQCmXLxenVxBboyCIbB7txCCGCew8UQvvk+zyeLUaTtj4HjebdFljcjSeOEGoSoQ\\ng1FnpP8r945bDwt4UrZJBP14i3Wd40iRlOU7cu5Q+wM/+4wlrIVzNgfecNkxYmua\\nqEyUQJr8U dGG0vvaIapu/wzkAS7x9idpjUxPItsuZrGmyD+hOMRRYiN8CFaHySmE\\nN/m3QTZO3ax5R0YKY9PIuaFj3ROZQwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIw\\nADAOBgNVHQ8BAf8EBAMCBSAwHQYDVR0OB BYEFPw9Po44tac3Bs+N5SMxhfnE2y4M\\nMIHiBgNVHSMEgdowgdeAFFFzkENQf4q7m0JFGlFHRT9Nn1yZoYGzpIGwMIGtMQsw\\nCQYDVQQGEwJVUzEUMBIGA1UEAwwLbG9jYWxkb21haW4xFDASBgNVBAcMC 1BlYXJs\\nIFJpdmVyMQswCQYDVQQIDAJOWTEPMA0GA1UECgwGUGZpemVyMQ0wCwYDVQQqDARO\\nb25lMQwwCgYDVQQLDANCVEkxKDAmBgkqhkiG9w0BCQEWGWhhcmkubWFoYWRldmFu\\nQHBmaXplci5jb2 0xDTALBgNVBAQMBE5vbmWCCQDxPWQp6gk3gDANBgkqhkiG9w0B\\nAQsFAAOCAgEAyiPp2gH4exF4OX7vUXlqXlqPQ6Np46k/Y8y/ExXZpBiTXtOBn+ku\\n/n4WPszTmRktjMO8Z5NIZhXbTabXNO3oy2v/r6 He6OLJVRfgxOLJ4UpkwilzeoBQ\\n3LLqrzFGUzVCefKELLNt/sNZZzJUvDjwbr0xF9FUQzTjJPFIl4yLK/JMe26A5it1\\nZtqgCLUWVD2GN1PaMi/xPOKjtPS4aCQg8GDrCpHXgvzxoFQO7BKbjR094W4IF7 69\\nLENZfWkF6SbYlw/ONhXUmvRq9Td8usPl8o1OIWM7zkfwyCZDmK/5Ulht/vybllm+\\n7tib9wJvLmLQavGpJr1PpAZfS3GnscGOZgarpWFLkTyNSO4K5rMSj/K30klK7XsS\\nVM3fGWlzXmr0LSoKhVw w4q0XPmttipUvPcK4v6RqxEgm5iQ7jE8PNZpUCHSlNi3I\\n2tc9ukZoWQCXg/qrAf7mm/9aXkHA9+hODFhWZWQ69mCVQPZgqwJ9N7DUx8EVE6HV\\nLJYedlvh6HHucmDdYhh0/sj0yFCiAL9SaMkUD2fjnXf CAdY4Nh6VA+LbDn3SEtiN\\n+EseMG7Xa+uqYpBGC6gIAkdTabjJpVOSPU2dgjTFbRP/t0WI6UISeQQV6eB0EWDh\\n2fE0JDyhZk9f1iglCfT3KgftjKpYqSat0wd80tVrbwTZpLKzXNVLURU=\\n-----END CERTIFICATE-----\\n\", \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:00.895052\", \"fun\": \"x509.sign_remote_certi ficate\", \"id\": \"ca\"}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:01.000Z","proce ssed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":59,"tag":"20170418135702561962","data":"{\"_stamp\": \"2017-04-18T13:57:02.562273\", \"minion s\": [\"null-0050568c7c69.pfizer.com\", \"ppklablinux31\", \" null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:02.000Z","master_id":"ppklablinu x30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":60,"tag":"salt/job/201704 18135702561962/new","data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135702561962\", \"tgt\": [\" null-0050568c7c69.pfizer.com\", \"ppklablinux31\", \"null- 0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:57:02.562671\", \"user\": \"root\", \"arg\": [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\ ", \"minions\": [\"null-0050568c7c69.pfizer.com\", \"ppklablinux31\", \"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:02.000Z","master_id": "ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":61,"tag":"salt /job/20170418135702561962/ret/ null-0050568c7c69.pfizer.com","data":"{\"fun_args\": [\"20170418135657522690\"], \"jid\": \"20170418135702561962\", \"return\": {\"tgt_type\": \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": \"roles:kube-(master|minion)\", \"pid\": 3113, \"ret\": \"\", \"user\": \"root\", \ "arg\": [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\"}, \"retcod e\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:02.604513\", \"fun\": \"saltutil.find_job\", \"id\": \"null-0050568c7c69.pfize r.com\"}","alter_time":"2017-04-18T13:57:02.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04 -18T13:57:06.000Z","worker_id":"worker1"},{"id":62,"tag":"salt/job/20170418135702561962/ret/ppklablinux31","data":"{\"fun_args\": [\"20170418135657522690\"], \"jid\": \"20170418135702561962\", \"return\": {\"tgt_type\": \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": \"roles:kube-(master|minion)\", \"pi d\": 3261, \"ret\": \"\", \"user\": \"root\", \"arg\": [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\", \"__kwarg __\": true}], \"fun\": \"state.sls\"}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:02.608875\", \"fun\": \"saltuti l.find_job\", \"id\": \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:02.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57: 06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":63,"tag":"20170418135704699378","data":"{\"_stamp\": \"2017-04-18T13:57:04.699 809\", \"minions\": [\"ca\"]}","alter_time":"2017-04-18T13:57:04.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","p rocessed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":64,"tag":"salt/job/20170418135704699378/new","data":"{\"tgt_type\": \"glob\", \"jid\": \" 20170418135704699378\", \"tgt\": \"ca\", \"_stamp\": \"2017-04-18T13:57:04.700563\", \"user\": \"root\", \"arg\": [{\"signing_policy\": \"minion\", \"public_k ey\": \"-----BEGIN PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSz xL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZr vm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+d PdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END PUBLIC KEY- ----\", \"C\": \"US\", \"CN\": \"null-0050568c7c69.pfizer.com\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, digitalSignature, keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": \"hari.mahadevan at pfizer.com\", \"basicConstraints\": \"critical CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": [\"ca\ "]}","alter_time":"2017-04-18T13:57:04.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T1 3:57:06.000Z","worker_id":"worker1"},{"id":65,"tag":"salt/job/20170418135704699378/ret/ca","data":"{\"fun_args\": [{\"signing_policy\": \"minion\", \"public_k ey\": \"-----BEGIN PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSz xL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZr vm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+d PdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END PUBLIC KEY- ----\", \"C\": \"US\", \"CN\": \"null-0050568c7c69.pfizer.com\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, digitalSignature, keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": \"hari.mahadevan at pfizer.com\", \"basicConstraints\": \"critical CA:false\"}], \"jid\": \"20170418135704699378\", \"return\": {\"Issuer Publi c Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UIXB43n\\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8 kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lG rDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOI gYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmF EECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN792kR823ed734CmUvl3hEeAlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xy FImAQEQBSUCAwEAAQ==\\n-----END PUBLIC KEY-----\\n\", \"Not After\": \"2017-07-27 13:57:04\", \"Subject Hash\": \"0F:F8:79:4C\", \"Public Key\": \"-----BEGIN P UBLIC KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48\\nAI+NcJg Laa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9 NgBWLGNfndRWaSVjF6flFn2feylfJgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh 3KSkUeyQh\\nU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/\\n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\neNAIdetOQuzr /EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi8\\n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n- ----END PUBLIC KEY-----\\n\", \"MD5 Finger Print\": \"63:69:7F:B6:C5:DB:8D:3A:1B:A3:0A:C4:7B:7E:72:D9\", \"SHA1 Finger Print\": \"C1:6E:EB:2F:9C:3F:8F:2E:51:5 C:5B:B9:EA:8D:C6:9A:99:2A:C4:92\", \"SHA-256 Finger Print\": \"22:75:34:23:78:30:65:31:9F:42:4F:DD:62:40:EE:7C:08:6E:89:BD:AE:F8:50:B4:09:F4:75:FE:BB:94:CB:C5 \", \"Serial Number\": \"70:1A:5D:73:54:F5:98:12\", \"Version\": 3, \"Key Size\": 4096, \"X509v3 Extensions\": {\"subjectKeyIdentifier\": \"15:A9:34:9A:0C:C6: 72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", \"keyUsage\": \"critical Key Encipherment\", \"authorityKeyIdentifier\": \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45 :1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress= hari.mahadevan at pfizer.com/SN=None\\nserial :F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": \"critical CA:FALSE\"}, \"Subject\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \"null-005 0568c7c69.pfizer.com\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \" hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU \": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-18 13:57:04\", \"Issuer\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU\": \" BTI\"}}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:04.783393\", \"fun\": \"x509.sign_remote_certificate\", \"id\ ": \"ca\"}","alter_time":"2017-04-18T13:57:04.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017- 04-18T13:57:06.000Z","worker_id":"worker1"},{"id":66,"tag":"20170418135705080506","data":"{\"_stamp\": \"2017-04-18T13:57:05.080798\", \"minions\": [\"ca\"]}" ,"alter_time":"2017-04-18T13:57:05.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57 :06.000Z","worker_id":"worker1"},{"id":67,"tag":"salt/job/20170418135705080506/new","data":"{\"tgt_type\": \"glob\", \"jid\": \"20170418135705080506\", \"tgt\ ": \"ca\", \"_stamp\": \"2017-04-18T13:57:05.081172\", \"user\": \"root\", \"arg\": [{\"signing_policy\": \"minion\", \"public_key\": \"-----BEGIN PUBLIC KEY- ----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48AI+NcJgLaa5aV+B9xoiq5uME4X DcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2fe ylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8 hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8n Xt8NM3yH1Hi809LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"null-0050568c7c69.pfizer.com\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, digitalSign ature, keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Email\": \"hari.mahadevan at pfizer.com\", \"basicConstraints\": \"critical CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": [\"ca\"]}","alter_time":"2017-04-18T13:57:05.000Z","mas ter_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":68,"ta g":"salt/job/20170418135705080506/ret/ca","data":"{\"fun_args\": [{\"signing_policy\": \"minion\", \"public_key\": \"-----BEGIN PUBLIC KEY-----MIICIjANBgkqhki G9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHP d0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG0 1ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4 to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUFhh yuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"null-0050568c7c6 9.pfizer.com\", \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, digitalSignature, keyEncipherm ent\", \"SN\": \"None\", \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Email\": \"hari.mahadevan at pfizer.com\", \"basicConstraints\ ": \"critical CA:false\"}], \"jid\": \"20170418135705080506\", \"return\": \"-----BEGIN CERTIFICATE-----\\nMIIHFzCCBP+gAwIBAgIIJbV/iVovLrEwDQYJKoZIhvcNAQELBQA wga0xCzAJBgNV\\nBAYTAlVTMRQwEgYDVQQDDAtsb2NhbGRvbWFpbjEUMBIGA1UEBwwLUGVhcmwgUml2\\nZXIxCzAJBgNVBAgMAk5ZMQ8wDQYDVQQKDAZQZml6ZXIxDTALBgNVBCoMBE5vbmUx\\nDDAKBgNV BAsMA0JUSTEoMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2YW5AcGZp\\nemVyLmNvbTENMAsGA1UEBAwETm9uZTAeFw0xNzA0MTgxMzU3MDVaFw0xNzA3Mjcx\\nMzU3MDVaMIG+MQswCQYDVQQGEwJVUzEl MCMGA1UEAwwcbnVsbC0wMDUwNTY4Yzdj\\nNjkucGZpemVyLmNvbTEUMBIGA1UEBwwLUGVhcmwgUml2ZXIxCzAJBgNVBAgMAk5Z\\nMQ8wDQYDVQQKDAZQZml6ZXIxDTALBgNVBCoMBE5vbmUxDDAKBgNVBAsM A0JUSTEo\\nMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2YW5AcGZpemVyLmNvbTENMAsGA1UE\\nBAwETm9uZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALCcIkLw9p8h\\nj+iGifBWb+uTu 2+iI8nFn5Ft2Sra2lQpRUshGfefKl0idZ1FZnWL7igIhpl3lE4t\\nGbr0s8S+PACPjXCYC2muWlfgfcaIqubjBOFw3KLQ8DUZ6rfiX1Unhz3dB3AOWoEi\\nIRvdwaex/qUtBmL2FzqbRf8eI43dvYydZ2RIb jeEbz0ytg9cZzQ/nGqTJ11wKCMq\\nUIO1qM5pdwmmYTOr95bXoCgDjJrtm2UIq2a75vG/TYAVixjX53UVmklYxen5RZ9n\\n3spXyYHgRdpNCSvU38htNREfPp+HBHVIfvM8xikt20RqwZ7zTvQNxlmkeD4hi /wf\\nb6omRp+FJ7bJIkM/YwdapUo6jWu8Prkq8nv0Y8bAKTcSyyvDqOE7OS0gWLFSfMgo\\ndykpFHskIVOf4iduncshA8J28+ntZcvIUS+sqKH0RwE6uZvPSeLaOlKAY7oFlq0a\\nUF7DgZvfP9OHVningm bkTc0fmB7oHTVMz3bP9dVxb7lfM4sb0r1nLU5vz44pBcy2\\nC0DM7kHDw3jQCHXrTkLs6/xBAQUn4PnT3XnSDlgWTAGckZB/kZ2uj8JMVyT/J17f\\nDTN8h9R4vNPS1BYYcrl3IvD0MxL1RHH6S6KdGveRiR 5zYNtcbVKFu1cYtNFdU6R+\\njFr5fmaJsfcvAkIERrib1qp697tw0149AgMBAAGjggEmMIIBIjAMBgNVHRMBAf8E\\nAjAAMA4GA1UdDwEB/wQEAwIFIDAdBgNVHQ4EFgQUFak0mgzGcqg0vtmHK1RMEU9f\\ nJZswgeIGA1UdIwSB2jCB14AUUXOQQ1B/irubQkUaUUdFP02fXJmhgbOkgbAwga0x\\nCzAJBgNVBAYTAlVTMRQwEgYDVQQDDAtsb2NhbGRvbWFpbjEUMBIGA1UEBwwLUGVh\\ncmwgUml2ZXIxCzAJBgNVBAg MAk5ZMQ8wDQYDVQQKDAZQZml6ZXIxDTALBgNVBCoM\\nBE5vbmUxDDAKBgNVBAsMA0JUSTEoMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2\\nYW5AcGZpemVyLmNvbTENMAsGA1UEBAwETm9uZYIJAPE9ZCn qCTeAMA0GCSqGSIb3\\nDQEBCwUAA4ICAQBsesVZM1ATYgejY/OdqyLoS69/Fza7G1PLY8cq22Y7u4DrLg01\\nCGyqaXis+hdKPUpCY7lkmL+Mdiy3oL5T7NigXODHtjLpCuyplVpXqvQlQuqNW8ph\\nkNqU VS54+N5vfbTmY8pAHRbvvVHBakFfpWrrtTtgWEj1v9e1a79NkchVbPKmSI+z\\nnv4gxZmuOVc24Ci10PGNfIue01cFR0ZGHBGns/8RfJvo32s0NvkM3GPy/kqkkMtX\\n8O2tp4YJKoh3sSZzQb8mhoxKL9IM yiNwHYPSiySHSDplyFk+g9TlVyjrpV30s8CP\\nvtV0TtY3ZsdVMECI/tp8tSHvOjoYxYiio8aXCwoGNFbD5IADk9KhPVkJN3O/Cd7n\\nypg04MP7MWmmrH9tcIbyshUgn11v/3SER5WZ9V1HDh6wRFzajByn K0wFHwG3fzTz\\nuYizwEB2nQNt3adNvZLbxsRRviFFpdipXFP6E1uwkj0Hcrgiz298rsqqu+5iAUuc\\nZgED519/cCQNevVWphnH7tHLenkXahRZerBG78YxHNehpuykGu1XHPoQMGWWmCE0\\ndlkxg/1HT yy/HJSDImsYd25J9NsCBo3/OibwQTFSx59jkC1FcHq5pNLEAX+b178Q\\niP0nMLxqobG11dcErKZkwDsW7zEJTxHy62/V11vlVC5h8Kmuxh+JGCgTgg==\\n-----END CERTIFICATE-----\\n\", \"ret code\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:05.178683\", \"fun\": \"x509.sign_remote_certificate\", \"id\": \"ca\"}","a lter_time":"2017-04-18T13:57:05.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06 .000Z","worker_id":"worker1"},{"id":69,"tag":"salt/job/20170418135657522690/ret/ null-0050568c7c69.pfizer.com","data":"{\"fun_args\": [\"repositories,etcd-prox y\", {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\"}], \"jid\": \"20170418135657522690\", \"return\": {\"file_|-/etc/pki/trust/anchors/SUSE_Ca aSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with proper permission s. No changes made.\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": \"13:57:02.868940\", \"result\": true, \"dura tion\": 0.844, \"__run_num__\": 5, \"changes\": {}, \"__id__\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, \"user_|-etcd_|-etcd_|-present\": {\"comment\": \"User etcd is present and up to date\", \"name\": \"etcd\", \"start_time\": \"13:57:05.450830\", \"result\": true, \"duration\": 1.177, \"__run_num__\": 11, \"changes\": {}, \"__id__\": \"etcd\"}, \"iptables_|-etcd_|-etcd_|-append\": {\"comment\": \"Set iptables rule for etcd to: /usr/sbin/iptables --wait -t filt er -A INPUT -p tcp -m state --state NEW -m multiport --dports 2379,2380,4001 --jump ACCEPT for ipv4\", \"name\": \"etcd\", \"start_time\": \"13:57:05.500990\ ", \"result\": true, \"duration\": 103.789, \"__run_num__\": 14, \"changes\": {\"locale\": \"etcd\"}, \"__id__\": \"etcd\"}, \"group_|-etcd_|-etcd_|-present\" : {\"comment\": \"Group etcd is present and up to date\", \"name\": \"etcd\", \"start_time\": \"13:57:05.446135\", \"result\": true, \"duration\": 0.478, \"__ run_num__\": 10, \"changes\": {}, \"__id__\": \"etcd\"}, \"file_|-etcd_|-/var/lib/etcd_|-directory\": {\"comment\": \"Directory /var/lib/etcd updated\", \"pch anges\": {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, \"name\": \"/var/lib/etcd\", \"start_time\": \"13:57:05.452433\", \"result\": true, \"duration\": 1.332, \ "__run_num__\": 12, \"changes\": {\"mode\": \"0700\"}, \"__id__\": \"etcd\"}, \"file_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": {\"comment\": \" File /etc/pki/minion.key exists with proper permissions. No changes made.\", \"pchanges\": {}, \"name\": \"/etc/pki/minion.key\", \"start_time\": \"13:57:04.6 75638\", \"result\": true, \"duration\": 0.806, \"__run_num__\": 7, \"changes\": {}, \"__id__\": \"/etc/pki/minion.key\"}, \"file_|-/etc/pki/trust/anchors_|-/ etc/pki/trust/anchors_|-directory\": {\"comment\": \"Directory /etc/pki/trust/anchors is in the correct state\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/ anchors\", \"start_time\": \"13:57:02.841138\", \"result\": true, \"duration\": 0.957, \"__run_num__\": 3, \"changes\": {}, \"__id__\": \"/etc/pki/trust/ancho rs\"}, \"file_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-managed\": {\"comment\": \"File /etc/pki/minion.crt exists with proper permissions. No changes mad e.\", \"pchanges\": {}, \"name\": \"/etc/pki/minion.crt\", \"start_time\": \"13:57:05.443918\", \"result\": true, \"duration\": 0.834, \"__run_num__\": 9, \"c hanges\": {}, \"__id__\": \"/etc/pki/minion.crt\"}, \"x509_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed \": {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt updated\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start _time\": \"13:57:02.865531\", \"result\": true, \"duration\": 3.272, \"__run_num__\": 4, \"changes\": {\"diff\": \"New file\"}, \"__id__\": \"/etc/pki/trust/a nchors/SUSE_CaaSP_CA.crt\"}, \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": {\"comment\": \"File /etc/zypp/repos. d/containers.repo updated\", \"pchanges\": {}, \"name\": \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13:56:58.408694\", \"result\": true, \"durat ion\": 153.355, \"__run_num__\": 0, \"changes\": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zypp/repos.d/containers.repo\"}, \"pkg_|-pyt hon-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": \"Package python-M2Crypto is already installed\", \"name\": \"python-M2Crypto\", \"start_time\": \ "13:57:02.340920\", \"result\": true, \"duration\": 498.795, \"__run_num__\": 1, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, \"pkg_|-etcd_|-etcd_|-inst alled\": {\"comment\": \"All specified packages are already installed\", \"name\": \"etcd\", \"start_time\": \"13:57:05.454362\", \"result\": true, \"duration \": 13.399, \"__run_num__\": 13, \"changes\": {}, \"__id__\": \"etcd\"}, \"file_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-/etc/systemd/system/etcd.serv ice.d/etcd.conf_|-managed\": {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf updated\", \"pchanges\": {}, \"name\": \"/etc/systemd/system/et cd.service.d/etcd.conf\", \"start_time\": \"13:57:07.212834\", \"result\": true, \"duration\": 71.567, \"__run_num__\": 18, \"changes\": {\"diff\": \"New file \", \"mode\": \"0644\"}, \"__id__\": \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, \"file_|-/etc/sysconfig/etcd_|-/etc/sysconfig/etcd_|-managed\": {\"com ment\": \"File /etc/sysconfig/etcd updated\", \"pchanges\": {}, \"name\": \"/etc/sysconfig/etcd\", \"start_time\": \"13:57:05.605471\", \"result\": true, \"du ration\": 83.655, \"__run_num__\": 15, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -1,47 +1,30 @@\\n-# [member]\\n-ETCD_NAME=default\\n-ETCD_DATA_DIR=\\\"/var/ lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n-#ETCD_ELECTION_TIMEOUT=\\ \"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\" http://localhost:2380\\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\" http://localhost:2379\\\"\\n-#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\ n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" http://localhost:2380\\\"\\n-# if you use differ ent ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this name, i.e. \\\"test=http://...\\\"\\n-#ETCD_INITIAL_CLUSTER=\\\"default= http://localhost:23 80\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ADVERTISE_CLIENT_URLS=\\\" http://localhost:2379\ \\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\\\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-#ETCD_DISCOVERY_PROXY=\\\"\\\"\\n-#\\n-#[proxy]\\ n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\\n-#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n-# ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FILE=\\\"\\\"\\n-#ETCD_KEY_FILE=\\\"\\\"\\n-#ETC D_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER_KEY_FILE=\\\"\\\"\\n-#ETCD_PEER_CLIENT_CERT_ AUTH=\\\"false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n-#\\n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# examples for -log-package-levels etcdserver=WAR NING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_LEVELS=\\\"\\\"\\n+# etcd proxy configuration\\n+# see https://coreos.com/etcd/docs/latest/op-guide/configuration.htm l\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\" null-0050568c7c69.pfizer.com\\\"\\n+\\n+ETCD_LISTEN_CLIENT_URLS=\\\" http://0.0.0.0:2379\\\"\\n+ ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380 \\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\" http://null-0050568c7c69.pfizer.com:2379,http://10.34.246.88:2379\\\" \\n+\\n+ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/pki/minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minion.key\\n+ETCD_TRUSTED_CA_FI LE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FILE=/etc/pki/minion.crt\\n+ET CD_PEER_KEY_FILE=/etc/pki/minion.key\\n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# ETCD_PEER_CLIENT_CERT_AUTH=on\\n+# ETCD_PEER_A UTO_TLS=on\\n+\\n+# discovery\\n+ETCD_DISCOVERY=\\\" http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DISCOVERY_FALLBACK=\\\"proxy\\ \"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" https://null-0050568c7c69.pfizer.com:2380,https://10.34.246.88:2380\\ \"\\n+ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n\", \"group\": \"etcd\", \"user\": \"etcd\"}, \"__id__\": \"/etc/sysconfig/etcd\"}, \"x509_|-/etc/pki/minion.cr t_|-/etc/pki/minion.crt_|-certificate_managed\": {\"comment\": \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, \"name\": \"/etc/pki/minion.crt\", \"st art_time\": \"13:57:04.676856\", \"result\": true, \"duration\": 766.905, \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": {\"Not After\": \"2017- 07-27 13:57:05\", \"X509v3 Extensions\": {\"subjectKeyIdentifier\": \"15:A9:34:9A:0C:C6:72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", \"keyUsage\": \"critical Key Encipherment\", \"authorityKeyIdentifier\": \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl Riv er/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress= hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": \"critical CA:FAL SE\"}, \"Subject Hash\": \"0F:F8:79:4C\", \"MD5 Finger Print\": \"72:69:54:30:5F:7D:BD:F7:6B:14:8C:6B:90:DD:8D:D2\", \"SHA1 Finger Print\": \"1F:2B:E1:94:FA:E F:F4:4C:43:D1:5B:E9:8C:2D:5C:3F:46:99:70:DD\", \"SHA-256 Finger Print\": \"D2:F8:80:38:D9:D5:1C:C0:EC:9A:3E:5A:34:C2:F8:22:36:E5:DB:C0:F3:E8:E3:7A:1D:60:96:5F :FD:23:FD:5E\", \"Serial Number\": \"25:B5:7F:89:5A:2F:2E:B1\", \"Version\": 3, \"Key Size\": 4096, \"Public Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgk qhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48\\nAI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRn qt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2feylf JgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQh\\nU5/iJ26dyyEDwnbz 6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/\\n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\neNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+R na6PwkxXJP8nXt8NM3yH1Hi8\\n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n-----END PUBLIC KEY-----\\n\" , \"Subject\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \" null-0050568c7c69.pfizer.com\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddr ess\": \" hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-1 8 13:57:05\", \"Issuer\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/minion.crt does not exist.\"}}, \"__id__\": \" /etc/pki/minion.crt\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchanges\": {}, \"name\": \"/etc/pki\", \"start_time\": \"13:57:02.839911\", \"result\": true, \"duration\": 1.089, \"__run_num__\": 2, \"changes\": {}, \"__id__\": \"/etc/pki\"}, \"cm d_|-etcd_|-rm -rf /var/lib/etcd/*_|-run\": {\"comment\": \"Command \\\"rm -rf /var/lib/etcd/*\\\" run\", \"name\": \"rm -rf /var/lib/etcd/*\", \"start_time\": \"13:57:05.737534\", \"result\": true, \"duration\": 8.905, \"__run_num__\": 16, \"changes\": {\"pid\": 3150, \"retcode\": 0, \"stderr\": \"\", \"stdout\": \ "\"}, \"__id__\": \"etcd\"}, \"service_|-etcd_|-etcd_|-running\": {\"comment\": \"Service etcd has been enabled, and is running\", \"name\": \"etcd\", \"start _time\": \"13:57:05.747520\", \"__id__\": \"etcd\", \"duration\": 1465.078, \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"result\": true}, \"x509_|-/e tc/pki/minion.key_|-/etc/pki/minion.key_|-private_key_managed\": {\"comment\": \"File /etc/pki/minion.key updated\", \"pchanges\": {}, \"name\": \"/etc/pki/mi nion.key\", \"start_time\": \"13:57:02.870325\", \"result\": true, \"duration\": 1805.146, \"__run_num__\": 6, \"changes\": \"New private key generated\", \"_ _id__\": \"/etc/pki/minion.key\"}}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:07.292911\", \"fun\": \"state.sls\ ", \"id\": \"null-0050568c7c69.pfizer.com\", \"out\": \"highstate\"}","alter_time":"2017-04-18T13:57:07.000Z","master_id":"ppklablinux30.localdomain_master"," taken_at":"2017-04-18T13:57:11.000Z","processed_at":"2017-04-18T13:57:11.000Z","worker_id":"worker1"},{"id":70,"tag":"20170418135712692212","data":"{\"_stamp\ ": \"2017-04-18T13:57:12.692634\", \"minions\": [\"ppklablinux31\", \"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:12.000Z","master_id":"p pklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z","worker_id":"worker1"},{"id":71,"tag":"salt/j ob/20170418135712692212/new","data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135712692212\", \"tgt\": [\"ppklablinux31\", \" null-0050568303b8.pfizer.com\" ], \"_stamp\": \"2017-04-18T13:57:12.693191\", \"user\": \"root\", \"arg\": [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"ppklab linux31\", \" null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T1 3:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z","worker_id":"worker1"},{"id":72,"tag":"salt/job/20170418135712692212/ret/ppklablinux31","data":"{\"fun _args\": [\"20170418135657522690\"], \"jid\": \"20170418135712692212\", \"return\": {\"tgt_type\": \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": \"roles:kube-(master|minion)\", \"pid\": 3261, \"ret\": \"\", \"user\": \"root\", \"arg\": [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": t rue, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\"}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T 13:57:12.743983\", \"fun\": \"saltutil.find_job\", \"id\": \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:12.000Z","master_id":"ppklablinux30.localdomain_ master","taken_at":"2017-04-18T13:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z","worker_id":"worker1"},{"id":73,"tag":"20170418135722886110","data":"{ \"_stamp\": \"2017-04-18T13:57:22.886424\", \"minions\": [\"ppklablinux31\", \" null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:22.000Z","mast er_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:26.000Z","processed_at":"2017-04-18T13:57:26.000Z","worker_id":"worker1"},{"id":74,"tag ":"salt/job/20170418135722886110/new","data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135722886110\", \"tgt\": [\"ppklablinux31\", \"null-0050568303b8.pfi zer.com\"], \"_stamp\": \"2017-04-18T13:57:22.886820\", \"user\": \"root\", \"arg\": [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"ppklablinux31\", \" null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:22.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"201 7-04-18T13:57:26.000Z","processed_at":"2017-04-18T13:57:26.000Z","worker_id":"worker1"},{"id":75,"tag":"salt/job/20170418135722886110/ret/ppklablinux31","data ":"{\"fun_args\": [\"20170418135657522690\"], \"jid\": \"20170418135722886110\", \"return\": {\"tgt_type\": \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": \"roles:kube-(master|minion)\", \"pid\": 3261, \"ret\": \"\", \"user\": \"root\", \"arg\": [\"repositories,etcd-proxy\", {\"queue\": false, \"concur rent\": true, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\"}, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"20 17-04-18T13:57:22.934015\", \"fun\": \"saltutil.find_job\", \"id\": \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:22.000Z","master_id":"ppklablinux30.loc aldomain_master","taken_at":"2017-04-18T13:57:26.000Z","processed_at":"2017-04-18T13:57:26.000Z","worker_id":"worker1"},{"id":76,"tag":"salt/job/2017041813565 7522690/ret/ppklablinux31","data":"{\"fun_args\": [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\"}], \"jid\": \"2 0170418135657522690\", \"return\": {\"file_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": {\"comment\": \" File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with proper permissions. No changes made.\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/anchors/SUSE_Ca aSP_CA.crt\", \"start_time\": \"13:56:59.209683\", \"result\": true, \"duration\": 0.895, \"__run_num__\": 5, \"changes\": {}, \"__id__\": \"/etc/pki/trust/an chors/SUSE_CaaSP_CA.crt\"}, \"user_|-etcd_|-etcd_|-present\": {\"comment\": \"User etcd is present and up to date\", \"name\": \"etcd\", \"start_time\": \"13: 57:01.166178\", \"result\": true, \"duration\": 1.237, \"__run_num__\": 11, \"changes\": {}, \"__id__\": \"etcd\"}, \"iptables_|-etcd_|-etcd_|-append\": {\"co mment\": \"Set iptables rule for etcd to: /usr/sbin/iptables --wait -t filter -A INPUT -p tcp -m state --state NEW -m multiport --dports 2379,2380,4001 --jum p ACCEPT for ipv4\", \"name\": \"etcd\", \"start_time\": \"13:57:01.186448\", \"result\": true, \"duration\": 82.853, \"__run_num__\": 14, \"changes\": {\"loc ale\": \"etcd\"}, \"__id__\": \"etcd\"}, \"group_|-etcd_|-etcd_|-present\": {\"comment\": \"Group etcd is present and up to date\", \"name\": \"etcd\", \"star t_time\": \"13:57:01.164678\", \"result\": true, \"duration\": 0.482, \"__run_num__\": 10, \"changes\": {}, \"__id__\": \"etcd\"}, \"file_|-etcd_|-/var/lib/et cd_|-directory\": {\"comment\": \"Directory /var/lib/etcd updated\", \"pchanges\": {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, \"name\": \"/var/lib/etcd\", \"s tart_time\": \"13:57:01.167829\", \"result\": true, \"duration\": 1.373, \"__run_num__\": 12, \"changes\": {\"mode\": \"0700\"}, \"__id__\": \"etcd\"}, \"file _|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": {\"comment\": \"File /etc/pki/minion.key exists with proper permissions. No changes made.\", \"pchan ges\": {}, \"name\": \"/etc/pki/minion.key\", \"start_time\": \"13:57:00.377681\", \"result\": true, \"duration\": 0.889, \"__run_num__\": 7, \"changes\": {}, \"__id__\": \"/etc/pki/minion.key\"}, \"file_|-/etc/pki/trust/anchors_|-/etc/pki/trust/anchors_|-directory\": {\"comment\": \"Directory /etc/pki/trust/anchor s is in the correct state\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/anchors\", \"start_time\": \"13:56:59.203831\", \"result\": true, \"duration\": 0.98 9, \"__run_num__\": 3, \"changes\": {}, \"__id__\": \"/etc/pki/trust/anchors\"}, \"file_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-managed\": {\"comment\": \"File /etc/pki/minion.crt exists with proper permissions. No changes made.\", \"pchanges\": {}, \"name\": \"/etc/pki/minion.crt\", \"start_time\": \"13:57:0 1.163388\", \"result\": true, \"duration\": 0.834, \"__run_num__\": 9, \"changes\": {}, \"__id__\": \"/etc/pki/minion.crt\"}, \"x509_|-/etc/pki/trust/anchors/ SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed\": {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt updated\", \"pchan ges\": {}, \"name\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": \"13:56:59.205883\", \"result\": true, \"duration\": 3.666, \"__run_num__\" : 4, \"changes\": {\"diff\": \"New file\"}, \"__id__\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ repos.d/containers.repo_|-managed\": {\"comment\": \"File /etc/zypp/repos.d/containers.repo is in the correct state\", \"pchanges\": {}, \"name\": \"/etc/zypp /repos.d/containers.repo\", \"start_time\": \"13:56:58.373899\", \"result\": true, \"duration\": 59.059, \"__run_num__\": 0, \"changes\": {}, \"__id__\": \"/e tc/zypp/repos.d/containers.repo\"}, \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": \"Package python-M2Crypto is already installed\", \ "name\": \"python-M2Crypto\", \"start_time\": \"13:56:58.963258\", \"result\": true, \"duration\": 239.098, \"__run_num__\": 1, \"changes\": {}, \"__id__\": \ "python-M2Crypto\"}, \"pkg_|-etcd_|-etcd_|-installed\": {\"comment\": \"All specified packages are already installed\", \"name\": \"etcd\", \"start_time\": \" 13:57:01.169779\", \"result\": true, \"duration\": 13.51, \"__run_num__\": 13, \"changes\": {}, \"__id__\": \"etcd\"}, \"file_|-/etc/systemd/system/etcd.servi ce.d/etcd.conf_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-managed\": {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf updated\", \"pcha nges\": {}, \"name\": \"/etc/systemd/system/etcd.service.d/etcd.conf\", \"start_time\": \"13:57:31.962373\", \"result\": true, \"duration\": 71.157, \"__run_n um__\": 18, \"changes\": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, \"file_|-/etc/sysconfig/ etcd_|-/etc/sysconfig/etcd_|-managed\": {\"comment\": \"File /etc/sysconfig/etcd updated\", \"pchanges\": {}, \"name\": \"/etc/sysconfig/etcd\", \"start_time\ ": \"13:57:01.269992\", \"result\": true, \"duration\": 83.05, \"__run_num__\": 15, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -1,47 +1,30 @@\\n-# [member]\\n -ETCD_NAME=default\\n-ETCD_DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_INTE RVAL=\\\"100\\\"\\n-#ETCD_ELECTION_TIMEOUT=\\\"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\" http://localhost:2380\\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\"http://localhos t:2379\\\"\\n-#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"htt p://localhost:2380\\\"\\n-# if you use different ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this name, i.e. \\\"test=http://...\\\"\\n-#ETCD_IN ITIAL_CLUSTER=\\\"default=http://localhost:2380\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ADV ERTISE_CLIENT_URLS=\\\" http://localhost:2379\\\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\\\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-#ETC D_DISCOVERY_PROXY=\\\"\\\"\\n-#\\n-#[proxy]\\n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\ \n-#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n-#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FIL E=\\\"\\\"\\n-#ETCD_KEY_FILE=\\\"\\\"\\n-#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER _KEY_FILE=\\\"\\\"\\n-#ETCD_PEER_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n-#\\n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# ex amples for -log-package-levels etcdserver=WARNING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_LEVELS=\\\"\\\"\\n+# etcd proxy configuration\\n+# see https://coreos.co m/etcd/docs/latest/op-guide/configuration.html\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\"ppklablinux31\\\"\\n+\\n+ETCD_LISTEN_CLIENT_URLS=\ \\"http://0.0.0.0:2379 \\\"\\n+ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380 \\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\" http://ppklablinux31.localdomain:2379,h ttp://10.34.246.31:2379\\\"\\n+\\n+ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/pki/minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minio n.key\\n+ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FIL E=/etc/pki/minion.crt\\n+ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# ETCD_PEER_CLIENT_CE RT_AUTH=on\\n+# ETCD_PEER_AUTO_TLS=on\\n+\\n+# discovery\\n+ETCD_DISCOVERY=\\\" http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DIS COVERY_FALLBACK=\\\"proxy\\\"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" https://ppklablinux31.localdomain:2380,htt ps://10.34.246.31:2380\\\"\\n+ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n\", \"group\": \"etcd\", \"user\": \"etcd\"}, \"__id__\": \"/etc/sysconfig/etcd\"}, \"x 509_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-certificate_managed\": {\"comment\": \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, \"name\": \"/et c/pki/minion.crt\", \"start_time\": \"13:57:00.378988\", \"result\": true, \"duration\": 784.241, \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": {\"Not After\": \"2017-07-27 13:57:00\", \"X509v3 Extensions\": {\"subjectKeyIdentifier\": \"FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\", \ "keyUsage\": \"critical Key Encipherment\", \"authorityKeyIdentifier\": \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN =localdomain/L=Pearl River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress= hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\", \"basicConstrai nts\": \"critical CA:FALSE\"}, \"Subject Hash\": \"03:5E:85:4C\", \"MD5 Finger Print\": \"60:B2:03:54:A9:98:50:F6:67:52:DB:CA:EC:99:9E:12\", \"SHA1 Finger Pri nt\": \"72:E8:0C:33:2D:49:BB:10:A5:53:6B:17:DC:15:1B:E6:BA:FB:7C:FE\", \"SHA-256 Finger Print\": \"A0:CD:51:FE:5C:8E:F0:B2:AD:40:82:AC:75:0B:85:77:AC:15:E1:76 :20:24:22:2B:01:D9:5D:B3:9F:8D:C3:00\", \"Serial Number\": \"CB:E0:DD:92:DC:7E:F6:F2\", \"Version\": 3, \"Key Size\": 4096, \"Public Key\": \"-----BEGIN PUBLI C KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBE\\nuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1k\\nqPU5zMjmeE0 UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\nStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu\\n7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp 0u9+CNpZ2Vc6kHWOk0NUXnrka8KQS\\npYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\nXqDAVDCcL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/ fcACG\\nIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\nXp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/\\nK/eOWw8LeFK2SQT9 eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2\\nTt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n----- END PUBLIC KEY-----\\n\", \"Subject\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \"ppklablinux31.localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-18 13:57:00\", \"Issuer\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River \", \"emailAddress\": \" hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/minion.crt does not exist .\"}}, \"__id__\": \"/etc/pki/minion.crt\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchan ges\": {}, \"name\": \"/etc/pki\", \"start_time\": \"13:56:59.202569\", \"result\": true, \"duration\": 1.123, \"__run_num__\": 2, \"changes\": {}, \"__id__\" : \"/etc/pki\"}, \"cmd_|-etcd_|-rm -rf /var/lib/etcd/*_|-run\": {\"comment\": \"Command \\\"rm -rf /var/lib/etcd/*\\\" run\", \"name\": \"rm -rf /var/lib/etcd /*\", \"start_time\": \"13:57:01.391652\", \"result\": true, \"duration\": 8.113, \"__run_num__\": 16, \"changes\": {\"pid\": 3293, \"retcode\": 0, \"stderr\" : \"\", \"stdout\": \"\"}, \"__id__\": \"etcd\"}, \"service_|-etcd_|-etcd_|-running\": {\"comment\": \"Service etcd has been enabled, and is dead\", \"name\": \"etcd\", \"start_time\": \"13:57:01.400864\", \"__id__\": \"etcd\", \"duration\": 30561.242, \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"result\": false}, \"x509_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-private_key_managed\": {\"comment\": \"File /etc/pki/minion.key updated\", \"pchanges\": {}, \"n ame\": \"/etc/pki/minion.key\", \"start_time\": \"13:56:59.211237\", \"result\": true, \"duration\": 1166.283, \"__run_num__\": 6, \"changes\": \"New private key generated\", \"__id__\": \"/etc/pki/minion.key\"}}, \"retcode\": 2, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:32.044625\", \ "fun\": \"state.sls\", \"id\": \"ppklablinux31\", \"out\": \"highstate\"}","alter_time":"2017-04-18T13:57:32.000Z","master_id":"ppklablinux30.localdomain_mast er","taken_at":"2017-04-18T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","worker_id":"worker1"},{"id":77,"tag":"service.running","data":"{\"comment \": \"Service etcd has been enabled, and is dead\", \"_stamp\": \"2017-04-18T13:57:32.045629\", \"retcode\": 2, \"result\": false, \"start_time\": \"13:57:01. 400864\", \"__id__\": \"etcd\", \"duration\": 30561.242, \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"name\": \"etcd\"}","alter_time":"2017-04-18T13: 57:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","worker_id":"worker 1"},{"id":78,"tag":"20170418135732909927","data":"{\"_stamp\": \"2017-04-18T13:57:32.910393\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time": "2017-04-18T13:57:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","wor ker_id":"worker1"},{"id":79,"tag":"salt/job/20170418135732909927/new","data":"{\"tgt_type\": \"list\", \"jid\": \"20170418135732909927\", \"tgt\": [\"null-005 0568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:57:32.910923\", \"user\": \"root\", \"arg\": [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-1 8T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","worker_id":"worker1"},{"id":80,"tag":"20170418135743253639","data":"{\"_stamp\": \"2017-04-18T13:5 7:43.253949\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:43.000Z","master_id":"ppklablinux30.localdomain_master","taken _at":"2017-04-18T13:57:47.000Z","processed_at":"2017-04-18T13:57:47.000Z","worker_id":"worker1"},{"id":81,"tag":"salt/job/20170418135743253639/new","data":"{\ "tgt_type\": \"grain\", \"jid\": \"20170418135743253639\", \"tgt\": \"roles:nfs\", \"_stamp\": \"2017-04-18T13:57:43.254335\", \"user\": \"root\", \"arg\": [{ \"queue\": false, \"concurrent\": false, \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.highstate\", \"minions\": [\"null-0050568303b8.pfizer. com\"]}","alter_time":"2017-04-18T13:57:43.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:47.000Z","processed_at":"2017-04- 18T13:57:47.000Z","worker_id":"worker1"},{"id":82,"tag":"20170418135748355712","data":"{\"_stamp\": \"2017-04-18T13:57:48.356190\", \"minions\": [\"null-00505 68303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:48.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:52.000Z","processe d_at":"2017-04-18T13:57:52.000Z","worker_id":"worker1"},{"id":83,"tag":"salt/job/20170418135748355712/new","data":"{\"tgt_type\": \"list\", \"jid\": \"2017041 8135748355712\", \"tgt\": [\"null-0050568303b8.pfizer.com\"], \"_stamp\": \"2017-04-18T13:57:48.356761\", \"user\": \"root\", \"arg\": [\"20170418135743253639 \"], \"fun\": \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com\"]}","alter_time":"2017-04-18T13:57:48.000Z","master_id":"ppklablinux30.loca ldomain_master","taken_at":"2017-04-18T13:57:52.000Z","processed_at":"2017-04-18T13:57:52.000Z","worker_id":"worker1"},{"id":84,"tag":"salt/run/20170418135525 317500/ret","data":"{\"fun_args\": [{\"mods\": \"orch.kubernetes\"}], \"jid\": \"20170418135525317500\", \"return\": {\"outputter\": \"highstate\", \"data\": {\"ppklablinux30.localdomain_master\": {\"salt_|-reboot_setup_|-reboot_setup_|-state\": {\"comment\": \"One or more requisite failed: orch.kubernetes.etcd_pro xy_setup\", \"__run_num__\": 10, \"__sls__\": \"orch.kubernetes\", \"changes\": {}, \"result\": false}, \"salt_|-ca_setup_|-ca_setup_|-state\": {\"comment\": \"States ran successfully. Updating ca.\", \"name\": \"ca_setup\", \"start_time\": \"13:56:01.361247\", \"result\": true, \"duration\": 25460.346, \"__run_num __\": 2, \"__jid__\": \"20170418135601489588\", \"changes\": {\"ret\": {\"ca\": {\"file_|-/etc/pki/issued_certs_|-/etc/pki/issued_certs_|-directory\": {\"comm ent\": \"Directory /etc/pki/issued_certs updated\", \"pchanges\": {\"/etc/pki/issued_certs\": {\"directory\": \"new\"}}, \"name\": \"/etc/pki/issued_certs\", \"start_time\": \"13:56:07.194634\", \"result\": true, \"duration\": 1.281, \"__run_num__\": 6, \"changes\": {\"/etc/pki/issued_certs\": \"New Dir\"}, \"__id_ _\": \"/etc/pki/issued_certs\"}, \"group_|-kube_group_|-kube_|-present\": {\"comment\": \"New group kube created\", \"name\": \"kube\", \"start_time\": \"13:5 6:03.585602\", \"result\": true, \"duration\": 492.98, \"__run_num__\": 2, \"changes\": {\"passwd\": \"x\", \"gid\": 492, \"name\": \"kube\", \"members\": []} , \"__id__\": \"kube_group\"}, \"module_|-mine.send_|-mine.send_|-run\": {\"comment\": \"Module function mine.send executed\", \"name\": \"mine.send\", \"star t_time\": \"13:56:08.526443\", \"result\": true, \"duration\": 522.106, \"__run_num__\": 11, \"changes\": {\"ret\": true}, \"__id__\": \"mine.send\"}, \"file_ |-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-managed\": {\"comment\": \"File /etc/pki/ca.crt exists with proper permissions. No changes made.\", \"pchanges\": {}, \" name\": \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.521611\", \"result\": true, \"duration\": 0.817, \"__run_num__\": 10, \"changes\": {}, \"__id__\": \"/ etc/pki/ca.crt\"}, \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": {\"comment\": \"File /etc/zypp/repos.d/containe rs.repo updated\", \"pchanges\": {}, \"name\": \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13:56:03.255349\", \"result\": true, \"duration\": 162 .91, \"__run_num__\": 0, \"changes\": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zypp/repos.d/containers.repo\"}, \"file_|-/etc/pki_|-/e tc/pki_|-directory\": {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchanges\": {}, \"name\": \"/etc/pki\", \"start_time\": \"13:56:07.19341 4\", \"result\": true, \"duration\": 1.082, \"__run_num__\": 5, \"changes\": {}, \"__id__\": \"/etc/pki\"}, \"x509_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-certi ficate_managed\": {\"comment\": \"File /etc/pki/ca.crt updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.483311\", \"resu lt\": true, \"duration\": 38.149, \"__run_num__\": 9, \"changes\": {\"Certificate\": {\"New\": {\"Not After\": \"2027-04-16 13:56:08\", \"SHA-256 Finger Print \": \"BF:C2:6C:31:46:B9:50:13:A2:E7:AD:BF:54:5E:FB:E5:C2:4C:E1:38:5A:0A:80:BC:AD:FC:79:92:24:E8:A8:97\", \"Subject Hash\": \"2F:0B:83:D6\", \"Serial Number\": \"F1:3D:64:29:EA:09:37:80\", \"SHA1 Finger Print\": \"20:2A:25:0D:0B:2F:91:E8:3F:92:F3:2B:7F:8A:C5:37:F1:1E:15:09\", \"X509v3 Extensions\": {\"subjectKeyIden tifier\": \"51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\", \"keyUsage\": \"critical Certificate Sign, CRL Sign\", \"authorityKeyIdentifier\": \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=ha ri.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": \"critical CA:TRUE\"}, \"MD5 Finger Print\": \"A5:99:B1:1C:A3:48: E9:64:86:35:24:7F:41:1F:00:90\", \"Version\": 3, \"Key Size\": 4096, \"Public Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAg EAzZD6PArP1r2y1UIXB43n\\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK 4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S 4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN 792kR823ed734CmUvl3hEeAlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END PUBLIC KEY-----\\n\", \"Issuer\": {\"C\": \"US\", \ "organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \" hari.mahadevan at pfizer.com\", \"GN\": \"N one\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-18 13:56:08\", \"Subject\": {\"C\": \"US\", \"orga nizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"None\" , \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/ca.crt does not exist.\"}}, \"__id__\": \"/etc/pki/ca.crt\"}, \"pkg_|-python-M2Crypto_|-python -M2Crypto_|-installed\": {\"comment\": \"Package python-M2Crypto is already installed\", \"name\": \"python-M2Crypto\", \"start_time\": \"13:56:06.872964\", \ "result\": true, \"duration\": 320.254, \"__run_num__\": 4, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, \"x509_|-/etc/pki/ca.key_|-/etc/pki/ca.key_|-pr ivate_key_managed\": {\"comment\": \"File /etc/pki/ca.key updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", \"start_time\": \"13:56:07.198826\", \"r esult\": true, \"duration\": 1282.75, \"__run_num__\": 7, \"changes\": \"New private key generated\", \"__id__\": \"/etc/pki/ca.key\"}, \"file_|-/etc/pki/ca.k ey_|-/etc/pki/ca.key_|-managed\": {\"comment\": \"\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", \"start_time\": \"13:56:08.481733\", \"result\": true, \"duration\": 1.035, \"__run_num__\": 8, \"changes\": {\"mode\": \"0600\"}, \"__id__\": \"/etc/pki/ca.key\"}, \"user_|-kube_user_|-kube_|-present\": {\"commen t\": \"New user kube created\", \"name\": \"kube\", \"start_time\": \"13:56:04.094251\", \"result\": true, \"duration\": 602.999, \"__run_num__\": 3, \"change s\": {\"shell\": \"/bin/bash\", \"workphone\": \"\", \"uid\": 1000, \"passwd\": \"x\", \"roomnumber\": \"\", \"gid\": 100, \"groups\": [\"kube\", \"users\"], \"home\": \"\", \"fullname\": \"\", \"homephone\": \"\", \"name\": \"kube\"}, \"__id__\": \"kube_user\"}, \"file_|-/etc/motd_|-/etc/motd_|-managed\": {\"comme nt\": \"File /etc/motd updated\", \"pchanges\": {}, \"name\": \"/etc/motd\", \"start_time\": \"13:56:03.418415\", \"result\": true, \"duration\": 145.221, \"_ _run_num__\": 1, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -0,0 +1,3 @@\\n+Welcome to ppklablinux30.localdomain.\\n+The roles of this node are:\\n+ - ca\\n\ "}, \"__id__\": \"/etc/motd\"}}}, \"out\": \"highstate\"}, \"__id__\": \"ca_setup\"}, \"salt_|-kube_master_setup_|-kube_master_setup_|-state\": {\"comment\": \"One or more requisite failed: orch.kubernetes.etcd_proxy_setup\", \"__run_num__\": 6, \"__sls__\": \"orch.kubernetes\", \"changes\": {}, \"result\": false}, \"salt_|-etcd_proxy_setup_|-etcd_proxy_setup_|-state\": {\"comment\": \"Run failed on minions: ppklablinux31\\nFailures:\\n ppklablinux31:\\n --------- -\\n ID: /etc/zypp/repos.d/containers.repo\\n Function: file.managed\\n Result: True\\n Comment: File /etc/zypp/repos.d/c ontainers.repo is in the correct state\\n Started: 13:56:58.373899\\n Duration: 59.059 ms\\n Changes: \\n ----------\\n ID: python-M2Crypto\\n Function: pkg.installed\\n Result: True\\n Comment: Package python-M2Crypto is already installed\\n Started: 13:56:58.963258\\n Duration: 239.098 ms\\n Changes: \\n ----------\\n ID: /etc/pki\\n Function: file.director y\\n Result: True\\n Comment: Directory /etc/pki is in the correct state\\n Started: 13:56:59.202569\\n Duration: 1.123 ms\\n Changes: \\n ----------\\n ID: /etc/pki/trust/anchors\\n Function: file.directory\\n Result: True\\n Comment : Directory /etc/pki/trust/anchors is in the correct state\\n Started: 13:56:59.203831\\n Duration: 0.989 ms\\n Changes: \\n ----- -----\\n ID: /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n Function: x509.pem_managed\\n Result: True\\n Comment: File /etc /pki/trust/anchors/SUSE_CaaSP_CA.crt updated\\n Started: 13:56:59.205883\\n Duration: 3.666 ms\\n Changes: \\n ----- -----\\n diff:\\n New file\\n ----------\\n ID: /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n Funct ion: file.managed\\n Result: True\\n Comment: File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with proper permissions. No changes made.\ \n Started: 13:56:59.209683\\n Duration: 0.895 ms\\n Changes: \\n ----------\\n ID: /etc/pki/minion.key\\n Fun ction: x509.private_key_managed\\n Result: True\\n Comment: File /etc/pki/minion.key updated\\n Started: 13:56:59.211237\\n Du ration: 1166.283 ms\\n Changes: Invalid Changes data: New private key generated\\n ----------\\n ID: /etc/pki/minion.key\\n F unction: file.managed\\n Result: True\\n Comment: File /etc/pki/minion.key exists with proper permissions. No changes made.\\n Starte d: 13:57:00.377681\\n Duration: 0.889 ms\\n Changes: \\n ----------\\n ID: /etc/pki/minion.crt\\n Function: x509.certi ficate_managed\\n Result: True\\n Comment: File /etc/pki/minion.crt updated\\n Started: 13:57:00.378988\\n Duration: 784.241 m s\\n Changes: \\n ----------\\n Certificate:\\n ----------\\n New:\\n ----------\\n Issuer:\\n ----------\\n C:\\n US\\n CN:\\n localdomain\\n GN:\\n None\\n L:\\n Pearl River\\n OU:\\n BTI\\n SP:\\n NY\\n emailAddress:\\n hari.mahadevan at pfizer.com\\n organizationName:\\n Pfizer\\n surname:\\n None\\n Issuer Hash:\\n 2F:0B:83:D 6\\n Key Size:\\n 4096\\n MD5 Finger Print:\\n 60: B2:03:54:A9:98:50:F6:67:52:DB:CA:EC:99:9E:12\\n Not After:\\n 2017-07-27 13:57:00\\n Not Before:\\n 2017-04-18 13:57:00\\n Public Key:\\n -----BEGIN PUBLI C KEY-----\\n MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBE\\n uXGuonX5+UGXOCHk0q j8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1k\\n qPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\n StCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu\\n 7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ 2Vc6kHWOk0NUXnrka8KQS\\n pYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\n XqDAVDC cL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACG\\n IICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\n Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/\\n K/eOWw8LeFK2SQT9eIt1neNIkZTlO3Lu UPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n /FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2\\n Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n -----END PUBLIC KEY-----\\n SHA-256 Finger Print:\\n A0:CD:51:FE:5C:8E:F0:B2:AD:40:82:AC:75:0B:85:77:AC:15:E1:76:20:24:22:2B:01:D9:5D:B3:9F:8D:C3:00\\n SHA1 Finger Prin t:\\n 72:E8:0C:33:2D:49:BB:10:A5:53:6B:17:DC:15:1B:E6:BA:FB:7C:FE\\n Serial Number:\\n CB:E0:DD:92:DC:7E:F6:F2\\n Subject:\\n ----------\\n C:\\n US\\n CN:\\n ppklablinux31.localdomain\\n GN:\\n None\\n L:\\n Pearl River\\n OU:\\n BTI\\n SP:\\n NY\\n e mailAddress:\\n hari.mahadevan at pfizer.com\\n organizationName:\\n Pfizer\\n surname:\\n None\\n Subject Hash:\\n 03:5E:85:4C\\n Version:\\n 3\\n X509v3 Extensions:\\n ----------\\n authorityKeyIdentifier:\\n keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:5 1:47:45:3F:4D:9F:5C:99\\n DirName:/C=US/CN=localdomain/L=Pearl River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.mahadeva n at pfizer.com/SN=None\\n serial:F1:3D:64:29:EA:09:37:80\\n basicConstraints:\\n critical CA:FALSE\\n keyUsage:\\n critical Key Encipherment\\n subjectKeyIdentifier:\\n FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\\n Old: \\n /etc/pki/minion.crt does not exist.\\n ----------\\n ID: /etc/pki/minion.crt\\n Function: file.managed\\n Result: True\\n Comment: File /etc/pki/minion.crt exists with proper permissions. No changes made.\\n Started: 13:57:01.163388\\n Duration: 0.834 ms\\n Changes: \\n ----------\\n ID: etcd\\n Function: group.present\\n Result: True\\n Comment: Group etcd is present and up to date\\n Started: 13:57:01.164678\\n Duration: 0.482 ms\\n Changes: \\n ----------\\n ID: etcd\\n Function: user.present\\n Result: True\\n Comment: User etcd is present and up to date\\n Started: 13:57: 01.166178\\n Duration: 1.237 ms\\n Changes: \\n ----------\\n ID: etcd\\n Function: file.directory\\n Name: /var/lib/etcd\\n Result: True\\n Comment: Directory /var/lib/etcd updated\\n Started: 13:57:01.167829\\n Duration: 1.373 ms\\ n Changes: \\n ----------\\n mode:\\n 0700\\n ----------\\n ID: etcd\\n Function: pkg.installed\\n Result: True\\n Comment: All specified packages are already installed\\n Started: 13:57:01.169779\\n Duration: 13.51 ms\\n Changes: \\n ----------\\n ID: etcd\\n Function: iptables.append\\n Result: True\\n Comment: Set iptables rule for etcd to: /usr/sbin/iptables --wait -t filter -A INPUT -p tcp -m state --state NEW -m multiport --dports 2379,2380,4001 --jum p ACCEPT for ipv4\\n Started: 13:57:01.186448\\n Duration: 82.853 ms\\n Changes: \\n ----------\\n locale:\\n etcd\\n ----------\\n ID: /etc/sysconfig/etcd\\n Function: file.managed\\n Result: True\\n Comment: File /etc/sysconfig/etcd updated\\n Started: 13:57:01.269992\\n Duration: 83.05 ms\\n Changes: \\n --- -------\\n diff:\\n --- \\n +++ \\n @@ -1,47 +1,30 @@\\n -# [member]\\n -ETCD_NAME=default\\n -ETCD_DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n -#ETC D_WAL_DIR=\\\"\\\"\\n -#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n -#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n -#ETCD_ELECTION_TIMEOUT=\\\"1000\\\"\\n -#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380\\\"\\n -ETCD_LISTEN _CLIENT_URLS=\\\" http://localhost:2379\\\"\\n -#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\n -#ETCD_MAX_WALS=\\\"5\\\"\\n -#ETCD_CORS=\\\"\\\"\\n -#\\n -#[cluster]\\n -#ETCD_INITIAL_ADVERTISE_PEER_URLS=\ \\" http://localhost:2380\\\"\\n -# if you use different ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this name, i.e. \\\"tes t=http://...\\\"\\n -#ETCD_INITIAL_CLUSTER=\\\"default=http://localhost:2380\\\"\\n -#ETCD_INITIAL_CLUSTER_STATE=\\\ "new\\\"\\n -#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n -ETCD_ADVERTISE_CLIENT_URLS=\\\"http://localhost:23 79\\\"\\n -#ETCD_DISCOVERY=\\\"\\\"\\n -#ETCD_DISCOVERY_SRV=\\\"\\\"\\n -#ETCD_DISCOVERY_FALLBA CK=\\\"proxy\\\"\\n -#ETCD_DISCOVERY_PROXY=\\\"\\\"\\n -#\\n -#[proxy]\\n -#ETCD_PROXY=\\\"off\\\"\\n -#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n -#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\\n -#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n -#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n -#ETCD_PR OXY_READ_TIMEOUT=\\\"0\\\"\\n -#\\n -#[security]\\n -#ETCD_CERT_FILE=\\\"\\\"\\n -#ETCD_KEY_FILE=\\\"\\\"\\n -#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n -#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n -#ETCD_PEER_CERT_FILE=\\\"\\\"\\n -#ETCD_PEER_KEY_FILE=\\\"\\\"\\n -#ETCD_PEER_CLIENT_CERT_AUTH=\\\" false\\\"\\n -#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n -#\\n -#[logging]\\n -#ETCD_DEBUG=\\\"false\\\"\\n -# examples for -log-package-levels etcdserver=WARNING,security=DEBUG\\n -#ETCD_LOG_PA CKAGE_LEVELS=\\\"\\\"\\n +# etcd proxy configuration\\n +# see https://coreos.com/etcd/docs/latest/op-guide/configur ation.html\\n +\\n +ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n +ETCD_NAME=\\\"ppklablinux31\\\"\\n +\\n +ETCD_LISTEN_CLIENT_URLS=\\\" http://0.0.0.0:2379\\\"\\n +ETCD_LISTEN_PEER_URLS=\\\"https: // 0.0.0.0:2380\\\"\\n +\\n +ETCD_ADVERTISE_CLIENT_URLS=\\\"http://ppklablinux31.localdomain:2379, http://10.34.246.31 :2379\\\"\\n +\\n +ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n +ETCD_CERT_FILE=/et c/pki/minion.crt\\n +ETCD_KEY_FILE=/etc/pki/minion.key\\n +ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA .crt\\n +\\n +ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n +ETCD_PEER_CERT_FIL E=/etc/pki/minion.crt\\n +ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\n +ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchor s/SUSE_CaaSP_CA.crt\\n +# ETCD_PEER_CLIENT_CERT_AUTH=on\\n +# ETCD_PEER_AUTO_TLS=on\\n +\\n +# discovery\\n +ETCD_DISCOVERY=\\\" http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n +ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n +\\n +ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n +ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" https://ppklablinux31.localdomain:2380,https://10.34.246.31:2380\\\"\\n +ETCD_INITIAL_CLUSTER_S TATE=\\\"new\\\"\\n group:\\n etcd\\n user:\\n etcd\\n ----------\\n ID: etcd\\n Function: cmd.run\\n Name: rm -rf /var/lib/etcd/*\\n Result: True\\n Comment: Command \\\"rm -rf /var/lib/et cd/*\\\" run\\n Started: 13:57:01.391652\\n Duration: 8.113 ms\\n Changes: \\n ----------\\n pid:\\ n 3293\\n retcode:\\n 0\\n stderr:\\n stdout:\\n ----------\\n ID: etcd\\n Function: service.running\\n Result: False\\n Comment: Service etcd has been enabled, and is dead\\n Started: 13:57:01.400864\\n Duration: 30561.242 ms\\n Changes: \\n ----------\\n etcd:\\n True\\n ----------\\n ID: /etc/systemd/system/etcd.service.d/etcd.conf\\n Function: file.managed\\n Result: True\\n Comment: File /etc/systemd/system/etcd.service.d/etcd.conf updated\\n Started: 13:57:31.962373\\n Duration: 71.157 ms\\n Changes: \\n ----------\\n diff:\\n New file\\n mode:\\n 0644\\n \\n Summary for ppklablinux31\\n -------------\\n Succeeded: 18 (changed=9)\\n Failed: 1\\n -------------\\n Total states run: 19\\n To tal run time: 33.080 s\\n\", \"name\": \"etcd_proxy_setup\", \"start_time\": \"13:56:57.390285\", \"result\": false, \"duration\": 45614.033, \"__run_num__\ ": 5, \"__jid__\": \"20170418135657522690\", \"changes\": {\"ret\": {\" null-0050568c7c69.pfizer.com\": {\"file_|-/etc/pki/trust/anchors_|-/etc/pki/trust/ancho rs_|-directory\": {\"comment\": \"Directory /etc/pki/trust/anchors is in the correct state\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/anchors\", \"start_ time\": \"13:57:02.841138\", \"result\": true, \"duration\": 0.957, \"__run_num__\": 3, \"changes\": {}, \"__id__\": \"/etc/pki/trust/anchors\"}, \"group_|-et cd_|-etcd_|-present\": {\"comment\": \"Group etcd is present and up to date\", \"name\": \"etcd\", \"start_time\": \"13:57:05.446135\", \"result\": true, \"du ration\": 0.478, \"__run_num__\": 10, \"changes\": {}, \"__id__\": \"etcd\"}, \"file_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": {\"comment\": \" File /etc/pki/minion.key exists with proper permissions. No changes made.\", \"pchanges\": {}, \"name\": \"/etc/pki/minion.key\", \"start_time\": \"13:57:04.6 75638\", \"result\": true, \"duration\": 0.806, \"__run_num__\": 7, \"changes\": {}, \"__id__\": \"/etc/pki/minion.key\"}, \"file_|-/etc/pki/trust/anchors/SUS E_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with proper permis sions. No changes made.\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": \"13:57:02.868940\", \"result\": true, \" duration\": 0.844, \"__run_num__\": 5, \"changes\": {}, \"__id__\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, \"file_|-/etc/systemd/system/etcd.service.d /etcd.conf_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-managed\": {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf updated\", \"pchanges \": {}, \"name\": \"/etc/systemd/system/etcd.service.d/etcd.conf\", \"start_time\": \"13:57:07.212834\", \"result\": true, \"duration\": 71.567, \"__run_num__ \": 18, \"changes\": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, \"file_|-/etc/pki/minion.crt _|-/etc/pki/minion.crt_|-managed\": {\"comment\": \"File /etc/pki/minion.crt exists with proper permissions. No changes made.\", \"pchanges\": {}, \"name\": \ "/etc/pki/minion.crt\", \"start_time\": \"13:57:05.443918\", \"result\": true, \"duration\": 0.834, \"__run_num__\": 9, \"changes\": {}, \"__id__\": \"/etc/pk i/minion.crt\"}, \"x509_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed\": {\"comment\": \"File /etc/pki/t rust/anchors/SUSE_CaaSP_CA.crt updated\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": \"13:57:02.865531\", \"res ult\": true, \"duration\": 3.272, \"__run_num__\": 4, \"changes\": {\"diff\": \"New file\"}, \"__id__\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, \"file _|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": {\"comment\": \"File /etc/zypp/repos.d/containers.repo updated\", \"pcha nges\": {}, \"name\": \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13:56:58.408694\", \"result\": true, \"duration\": 153.355, \"__run_num__\": 0, \"changes\": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zypp/repos.d/containers.repo\"}, \"pkg_|-etcd_|-etcd_|-installed\": {\"comment\ ": \"All specified packages are already installed\", \"name\": \"etcd\", \"start_time\": \"13:57:05.454362\", \"result\": true, \"duration\": 13.399, \"__run_ num__\": 13, \"changes\": {}, \"__id__\": \"etcd\"}, \"service_|-etcd_|-etcd_|-running\": {\"comment\": \"Service etcd has been enabled, and is running\", \"n ame\": \"etcd\", \"start_time\": \"13:57:05.747520\", \"__id__\": \"etcd\", \"duration\": 1465.078, \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"resu lt\": true}, \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": \"Package python-M2Crypto is already installed\", \"name\": \"python-M2Cry pto\", \"start_time\": \"13:57:02.340920\", \"result\": true, \"duration\": 498.795, \"__run_num__\": 1, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, \" user_|-etcd_|-etcd_|-present\": {\"comment\": \"User etcd is present and up to date\", \"name\": \"etcd\", \"start_time\": \"13:57:05.450830\", \"result\": tr ue, \"duration\": 1.177, \"__run_num__\": 11, \"changes\": {}, \"__id__\": \"etcd\"}, \"file_|-etcd_|-/var/lib/etcd_|-directory\": {\"comment\": \"Directory / var/lib/etcd updated\", \"pchanges\": {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, \"name\": \"/var/lib/etcd\", \"start_time\": \"13:57:05.452433\", \"result\": true, \"duration\": 1.332, \"__run_num__\": 12, \"changes\": {\"mode\": \"0700\"}, \"__id__\": \"etcd\"}, \"file_|-/etc/sysconfig/etcd_|-/etc/sysconfig/etcd_ |-managed\": {\"comment\": \"File /etc/sysconfig/etcd updated\", \"pchanges\": {}, \"name\": \"/etc/sysconfig/etcd\", \"start_time\": \"13:57:05.605471\", \"r esult\": true, \"duration\": 83.655, \"__run_num__\": 15, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -1,47 +1,30 @@\\n-# [member]\\n-ETCD_NAME=default\\n-ETCD _DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n-#ETCD_ ELECTION_TIMEOUT=\\\"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\" http://localhost:2380\\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\" http://localhost:2379\\\"\\n-#ETCD_MAX_SN APSHOTS=\\\"5\\\"\\n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" http://localhost:2380\\\"\\n- # if you use different ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this name, i.e. \\\"test=http://...\\\"\\n-#ETCD_INITIAL_CLUSTER=\\\"default= http://localhost:2380\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ADVERTISE_CLIENT_URLS=\\\"htt p://localhost:2379\\\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\\\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-#ETCD_DISCOVERY_PROXY=\\\"\\\" \\n-#\\n-#[proxy]\\n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\\n-#ETCD_PROXY_DIAL_TIMEOU T=\\\"1000\\\"\\n-#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FILE=\\\"\\\"\\n-#ETCD_KEY_FI LE=\\\"\\\"\\n-#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER_KEY_FILE=\\\"\\\"\\n-#ETC D_PEER_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n-#\\n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# examples for -log-package-le vels etcdserver=WARNING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_LEVELS=\\\"\\\"\\n+# etcd proxy configuration\\n+# see https://coreos.com/etcd/docs/latest/op-guid e/configuration.html\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\" null-0050568c7c69.pfizer.com\\\"\\n+\\n+ETCD_LISTEN_CLIENT_URLS=\\\"http://0 .0.0.0:2379\\\"\\n+ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380 \\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\" http://null-0050568c7c69.pfizer.com:2379,http://10 .34.246.88:2379\\\"\\n+\\n+ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/pki/minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minion.key\\n +ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FILE=/etc/p ki/minion.crt\\n+ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# ETCD_PEER_CLIENT_CERT_AUTH= on\\n+# ETCD_PEER_AUTO_TLS=on\\n+\\n+# discovery\\n+ETCD_DISCOVERY=\\\" http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DISCOVERY_F ALLBACK=\\\"proxy\\\"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" https://null-0050568c7c69.pfizer.com:2380,https:// 10.34.246.88:2380\\\"\\n+ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n\", \"group\": \"etcd\", \"user\": \"etcd\"}, \"__id__\": \"/etc/sysconfig/etcd\"}, \"x509_| -/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-certificate_managed\": {\"comment\": \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, \"name\": \"/etc/pki /minion.crt\", \"start_time\": \"13:57:04.676856\", \"result\": true, \"duration\": 766.905, \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": {\"N ot After\": \"2017-07-27 13:57:05\", \"SHA-256 Finger Print\": \"D2:F8:80:38:D9:D5:1C:C0:EC:9A:3E:5A:34:C2:F8:22:36:E5:DB:C0:F3:E8:E3:7A:1D:60:96:5F:FD:23:FD: 5E\", \"Subject Hash\": \"0F:F8:79:4C\", \"Serial Number\": \"25:B5:7F:89:5A:2F:2E:B1\", \"SHA1 Finger Print\": \"1F:2B:E1:94:FA:EF:F4:4C:43:D1:5B:E9:8C:2D:5C :3F:46:99:70:DD\", \"X509v3 Extensions\": {\"subjectKeyIdentifier\": \"15:A9:34:9A:0C:C6:72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", \"keyUsage\": \"critical Key Encipherment\", \"authorityKeyIdentifier\": \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl Ri ver/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress= hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": \"critical CA:FA LSE\"}, \"MD5 Finger Print\": \"72:69:54:30:5F:7D:BD:F7:6B:14:8C:6B:90:DD:8D:D2\", \"Version\": 3, \"Key Size\": 4096, \"Public Key\": \"-----BEGIN PUBLIC KEY -----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48\\nAI+NcJgLaa5aV+B9 xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfn dRWaSVjF6flFn2feylfJgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQh \\nU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/\\n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\neNAIdetOQuzr/EEBBSfg+ dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi8\\n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n-----END P UBLIC KEY-----\\n\", \"Issuer\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAdd ress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04- 18 13:57:05\", \"Subject\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": \" null-0050568c7c69.pfizer.com\", \"SP\": \"NY\", \"L\": \"Pearl River\" , \"emailAddress\": \"hari.mahadevan at pfizer.com\", \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/minion.crt does not exist.\ "}}, \"__id__\": \"/etc/pki/minion.crt\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchange s\": {}, \"name\": \"/etc/pki\", \"start_time\": \"13:57:02.839911\", \"result\": true, \"duration\": 1.089, \"__run_num__\": 2, \"changes\": {}, \"__id__\": \"/etc/pki\"}, \"cmd_|-etcd_|-rm -rf /var/lib/etcd/*_|-run\": {\"comment\": \"Command \\\"rm -rf /var/lib/etcd/*\\\" run\", \"name\": \"rm -rf /var/lib/etcd/* \", \"start_time\": \"13:57:05.737534\", \"result\": true, \"duration\": 8.905, \"__run_num__\": 16, \"changes\": {\"pid\": 3150, \"retcode\": 0, \"stderr\": \"\", \"stdout\": \"\"}, \"__id__\": \"etcd\"}, \"iptables_|-etcd_|-etcd_|-append\": {\"comment\": \"Set iptables rule for etcd to: /usr/sbin/iptables --wait -t filter -A INPUT -p tcp -m state --state NEW -m multiport --dports 2379,2380,4001 --jump ACCEPT for ipv4\", \"name\": \"etcd\", \"start_time\": \"13:57:05. 500990\", \"result\": true, \"duration\": 103.789, \"__run_num__\": 14, \"changes\": {\"locale\": \"etcd\"}, \"__id__\": \"etcd\"}, \"x509_|-/etc/pki/minion.k ey_|-/etc/pki/minion.key_|-private_key_managed\": {\"comment\": \"File /etc/pki/minion.key updated\", \"pchanges\": {}, \"name\": \"/etc/pki/minion.key\", \"s tart_time\": \"13:57:02.870325\", \"result\": true, \"duration\": 1805.146, \"__run_num__\": 6, \"changes\": \"New private key generated\", \"__id__\": \"/etc /pki/minion.key\"}}}, \"out\": \"highstate\"}, \"__id__\": \"etcd_proxy_setup\"}, \"salt_|-kube_haproxy_setup_|-kube_haproxy_setup_|-state\": {\"comment\": \" One or more requisite failed: orch.kubernetes.kube_master_setup\", \"__run_num__\": 8, \"__sls__\": \"orch.kubernetes\", \"changes\": {}, \"result\": false}, \"salt_|-mine_update_|-mine.update_|-function\": {\"comment\": \"Function ran successfully. Function mine.update ran on null-0050568c7c69.pfizer.com, ca, ppkl ablinux31.\", \"name\": \"mine.update\", \"start_time\": \"13:55:30.895706\", \"result\": true, \"duration\": 15215.053, \"__run_num__\": 0, \"__jid__\": \"20 170418135531035630\", \"changes\": {\"ret\": {\" null-0050568c7c69.pfizer.com\": true, \"ca\": null, \"ppklablinux31\": true}, \"out\": \"highstate\"}, \"__id_ _\": \"mine_update\"}, \"salt_|-etcd_discovery_setup_|-etcd_discovery_setup_|-state\": {\"comment\": \"States ran successfully. Updating ppklablinux31.\", \"n ame\": \"etcd_discovery_setup\", \"start_time\": \"13:56:26.822228\", \"result\": true, \"duration\": 15283.009, \"__run_num__\": 3, \"__jid__\": \"2017041813 5626951275\", \"changes\": {\"ret\": {\"ppklablinux31\": {\"cmd_|-set_size_|-curl -L -X PUT http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_c onfig/size -d value=1_|-run\": {\"comment\": \"Command \\\"curl -L -X PUT http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size -d valu e=1\\\" run\", \"name\": \"curl -L -X PUT http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size -d value=1\", \"start_time\": \"13:56:3 1.855687\", \"result\": true, \"duration\": 80.902, \"__run_num__\": 4, \"changes\": {\"pid\": 3252, \"retcode\": 0, \"stderr\": \" % Total % Received % X ferd Average Speed Time Time Time Current\\n Dload Upload Total Spent Left Speed\\n\\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\\r100 121 100 114 100 7 7709 473 --:--:-- --:--:-- --:--:-- 8142\", \"stdout\": \"{ \\\"action\\\":\\\"set\\\",\\\"node\\\":{\\\"key\\\":\\\"/_etcd/registry/k8s/_config/size\\\",\\\"value\\\":\\\"1\\\",\\\"modifiedIndex\\\":6,\\\"createdIndex \\\":6}}\"}, \"__id__\": \"set_size\"}, \"pkg_|-cleanup_|-etcdctl_|-installed\": {\"comment\": \"Package etcdctl is already installed\", \"name\": \"etcdctl\" , \"start_time\": \"13:56:30.443368\", \"result\": true, \"duration\": 481.147, \"__run_num__\": 1, \"changes\": {}, \"__id__\": \"cleanup\"}, \"file_|-/etc/z ypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": {\"comment\": \"File /etc/zypp/repos.d/containers.repo updated\", \"pchanges\": { }, \"name\": \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13:56:27.452640\", \"result\": true, \"duration\": 196.93, \"__run_num__\": 0, \"changes \": {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zypp/repos.d/containers.repo\"}, \"pkg_|-set_size_|-curl_|-installed\": {\"comment\": \"P ackage curl is already installed\", \"name\": \"curl\", \"start_time\": \"13:56:31.841690\", \"result\": true, \"duration\": 13.602, \"__run_num__\": 3, \"cha nges\": {}, \"__id__\": \"set_size\"}, \"cmd_|-cleanup_|-etcdctl --endpoint= http://ppklablinux30.pfizer.com:2379 rm -r /_etcd/registry/k8s_|-run\": {\"comment \": \"check_cmd determined the state succeeded\", \"name\": \"etcdctl --endpoint= http://ppklablinux30.pfizer.com:2379 rm -r /_etcd/registry/k8s\", \"start_tim e\": \"13:56:30.943924\", \"__id__\": \"cleanup\", \"duration\": 897.534, \"__run_num__\": 2, \"changes\": {\"pid\": 3246, \"retcode\": 4, \"stderr\": \"Error : dial tcp [::1]:2379: getsockopt: connection refused\", \"stdout\": \"\"}, \"result\": true}}}, \"out\": \"highstate\"}, \"__id__\": \"etcd_discovery_setup\ "}, \"salt_|-refresh_pillar_|-saltutil.refresh_pillar_|-function\": {\"comment\": \"Function ran successfully. Function saltutil.refresh_pillar ran on null-00 50568c7c69.pfizer.com, ca, ppklablinux31.\", \"name\": \"saltutil.refresh_pillar\", \"start_time\": \"13:55:46.110938\", \"result\": true, \"duration\": 15249 .608, \"__run_num__\": 1, \"__jid__\": \"20170418135546241343\", \"changes\": {\"ret\": {\" null-0050568c7c69.pfizer.com\": true, \"ca\": true, \"ppklablinux31 \": true}, \"out\": \"highstate\"}, \"__id__\": \"refresh_pillar\"}, \"salt_|-etcd_nodes_setup_|-etcd_nodes_setup_|-state\": {\"comment\": \"States ran succes sfully.\", \"name\": \"etcd_nodes_setup\", \"start_time\": \"13:56:42.106031\", \"result\": true, \"duration\": 15283.737, \"__run_num__\": 4, \"changes\": {} , \"__id__\": \"etcd_nodes_setup\"}, \"salt_|-kube_minion_setup_|-kube_minion_setup_|-state\": {\"comment\": \"One or more requisite failed: orch.kubernetes.k ube_master_setup\", \"__run_num__\": 7, \"__sls__\": \"orch.kubernetes\", \"changes\": {}, \"result\": false}, \"salt_|-kube_nfs_setup_|-kube_nfs_setup_|-stat e\": {\"comment\": \"States ran successfully.\", \"name\": \"kube_nfs_setup\", \"start_time\": \"13:57:43.005316\", \"result\": true, \"duration\": 15395.687, \"__run_num__\": 9, \"changes\": {}, \"__id__\": \"kube_nfs_setup\"}}, \"retcode\": 1}}, \"success\": false, \"_stamp\": \"2017-04-18T13:57:58.404025\", \"us er\": \"saltapi\", \"fun\": \"runner.state.orchestrate\"}","alter_time":"2017-04-18T13:57:58.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":" 2017-04-18T13:58:02.000Z","processed_at":"2017-04-18T13:58:02.000Z","worker_id":"worker1"},{"id":85,"tag":"key","data":"{\"_stamp\": \"2017-04-19T13:13:57.297 326\", \"rotate_aes_key\": true}","alter_time":"2017-04-19T13:13:57.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-19T13:13:59.000Z" ,"processed_at":"2017-04-19T13:13:59.000Z","worker_id":"worker1"}] ppklablinux30-010034246250:~ # On Wed, Apr 19, 2017 at 11:26 AM, Rafael Fern?ndez L?pez < rfernandezlopez at suse.com> wrote: > Hello, > > On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > > > > > Installed each VM individually booting from the iso image, using static > > IP address, gateway and DNS for each. > > > > > > > > After build the CaaS installer comes up with an incorrect/wierd hostname > > for each system > > > > > > > > Admin: ppklablinux30.localdomain > > > > Master: ppklablinux31.localdomain > > > > Worker: null-0050568c7c69 > > Could you please login into the Admin node and provide the output of the > following commands? > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts Pillar.all.to_json" > > and > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts SaltEvent.all.to_json" > > > Thank you, > Rafael Fern?ndez L?pez. > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: From rfernandezlopez at suse.com Thu Apr 20 04:07:30 2017 From: rfernandezlopez at suse.com (=?UTF-8?Q?Rafael_Fern=c3=a1ndez_L=c3=b3pez?=) Date: Thu, 20 Apr 2017 12:07:30 +0200 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames In-Reply-To: References: <77f28473-2c63-56be-3919-c832f15442e1@suse.com> Message-ID: Hello, Based on the output I think that you visited Velum (the web UI to set up the cluster) in a way that the rest of the cluster wasn't able to resolve. On the Beta 2 version we make the assumption that the way you visit the UI (http://administration-node-name.localdomain) in order to bootstrap the cluster is how the rest of the cluster will start the etcd discovery (using in this case administration-node-name.localdomain). In future versions we will ask explicitly for this value so you can bootstrap the cluster through the UI using a hostname or an IP address and set this value that the rest of the cluster will use to a different one (so they aren't tied). If you try to visit velum when you set the certificate information using the machine IP address instead of a name, can you confirm it is still failing please? Regards, Rafael Fern?ndez L?pez. On 04/19/2017 05:36 PM, Hari Mahadevan wrote: > > ppklablinux30-010034246250:~ # docker exec -it $(docker ps | grep > velum-dashboard | awk '{print $1}') bundle exec rails runner "puts > Pillar.all.to_json" > [{"id":1,"minion_id":null,"pillar":"certificate_information.subject_properties.O","value":"Pfizer","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017- > > 04-18T13:51:29.000Z"},{"id":2,"minion_id":null,"pillar":"certificate_information.subject_properties.OU","value":"BTI","created_at":"2017-04-18T13:51:29.000Z", > > "updated_at":"2017-04-18T13:51:29.000Z"},{"id":3,"minion_id":null,"pillar":"certificate_information.subject_properties.Email","value":"hari.mahadevan at pfizer.c > > om","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":4,"minion_id":null,"pillar":"certificate_information.subject_proper > > ties.C","value":"US","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":5,"minion_id":null,"pillar":"certificate_informati > on.subject_properties.ST > ","value":"NY","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":6,"minion_id":null,"pillar":"cer > > tificate_information.subject_properties.L","value":"Pearl > River","created_at":"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51:29.000Z"},{"id":7,"min > > ion_id":null,"pillar":"dashboard","value":"ppklablinux30.pfizer.com > ","created_at":"2017-04-18T13:51:30.000Z","updated_at":"2017-04-18T13:51:30.000Z"}] > ppklablinux30-010034246250:~ # > ppklablinux30-010034246250:~ # docker exec -it $(docker ps | grep > velum-dashboard | awk '{print $1}') bundle exec rails runner "puts > SaltEvent.all.to_json" > > [{"id":1,"tag":"salt/auth","data":"{\"_stamp\": > \"2017-04-18T13:14:12.208279\", \"act\": \"accept\", \"id\": > \"null-0050568303b8.pfizer.com \", > \"pub\": \"---- -BEGIN PUBLIC > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBb23dp3u0hEhGCCzIPg\\np2ajpBqKDkWXPjz2rfxr52sL72HaU7mvoGjNR8qTA8smuseIvwg2AtwvT0dKo4v+\\ > > n5g8sn9OJjLr3r7PJUnWkmUxFCgpdOgoLtL6TvsGxrxmIUvIOl/vpn0i8i7pKJ6gY\\nD2WNEfk7d+39Ptm7yEPgrbgA6TCUQYyjlJW/o/mtuBunZP0FBgeUe5zZggM7W4ix\\nFZmW9zr0Q/sscR9gHRF/jFB > > NPI/b+VaPbXYHxaFL0Tefg9CL/5uL1uoXk+QIU1dt\\nRXrcmUAMwmz9vBpnctn8shlZEeo5kDYahyyh/KdQeXdit7dtZ5+dCVKSz0PUX4SM\\nkwIDAQAB\\n-----END > PUBLIC KEY-----\", \"result \": > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:13.000Z","processed_at":"2017-0 > > 4-18T13:14:13.000Z","worker_id":"worker1"},{"id":2,"tag":"salt/auth","data":"{\"_stamp\": > \"2017-04-18T13:14:12.227590\", \"act\": \"accept\", \"id\": \"ca\", > \"pub\": \"-----BEGIN PUBLIC > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuQ+GZ/yWkJ9KqzgJnygo\\npmI6wzhDHWUfpAqiaFLNpfo57IhbwTQ1qGDX/ke9pIueyijvfN > > 19sKuE0GIDrIYG\\nKzcfUcXmWButHA4cm34GtaOLIbA+NzLrOL8ylUmVSpo9KqDPhRsGzY51eFBVeyt1\\nqrmgFHYE3r2HWyGfRKDVT4yETwVGE4ge5GWyhZBo85gqPzx4PMVvSfvh1bmflUdr\\nrR5yhhj > > stVUE54wIsZXwpXReSjNFw9I+28AX3bSamP1FuBC8sqI4qcOFerA9ULbM\\nLqIxmEe3brBxBHuiDuajZc9pHF8tPRbVYA2yAgCMvS5z/45GPkjKnguWdmUPvDKs\\nMQIDAQAB\\n-----END > PUBLIC KEY- ----\", \"result\": > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:13.000Z","proce > > ssed_at":"2017-04-18T13:14:13.000Z","worker_id":"worker1"},{"id":3,"tag":"salt/auth","data":"{\"_stamp\": > \"2017-04-18T13:14:12.255601\", \"act\": \"accept\", > \"id\": \"ca\", \"pub\": \"-----BEGIN PUBLIC > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuQ+GZ/yWkJ9KqzgJnygo\\npmI6wzhDHWUfpAqiaFLNpfo57IhbwTQ1qG > > DX/ke9pIueyijvfN19sKuE0GIDrIYG\\nKzcfUcXmWButHA4cm34GtaOLIbA+NzLrOL8ylUmVSpo9KqDPhRsGzY51eFBVeyt1\\nqrmgFHYE3r2HWyGfRKDVT4yETwVGE4ge5GWyhZBo85gqPzx4PMVvSfvh1b > > mflUdr\\nrR5yhhjstVUE54wIsZXwpXReSjNFw9I+28AX3bSamP1FuBC8sqI4qcOFerA9ULbM\\nLqIxmEe3brBxBHuiDuajZc9pHF8tPRbVYA2yAgCMvS5z/45GPkjKnguWdmUPvDKs\\nMQIDAQAB\\n---- > -END PUBLIC KEY-----\", \"result\": > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14 > > :13.000Z","processed_at":"2017-04-18T13:14:13.000Z","worker_id":"worker1"},{"id":4,"tag":"salt/auth","data":"{\"_stamp\": > \"2017-04-18T13:14:12.273869\", \"ac > t\": \"accept\", \"id\": \"null-0050568303b8.pfizer.com > \", \"pub\": \"-----BEGIN PUBLIC > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBb23dp3u0hEhGC > > CzIPg\\np2ajpBqKDkWXPjz2rfxr52sL72HaU7mvoGjNR8qTA8smuseIvwg2AtwvT0dKo4v+\\n5g8sn9OJjLr3r7PJUnWkmUxFCgpdOgoLtL6TvsGxrxmIUvIOl/vpn0i8i7pKJ6gY\\nD2WNEfk7d+39Ptm7 > > yEPgrbgA6TCUQYyjlJW/o/mtuBunZP0FBgeUe5zZggM7W4ix\\nFZmW9zr0Q/sscR9gHRF/jFBNPI/b+VaPbXYHxaFL0Tefg9CL/5uL1uoXk+QIU1dt\\nRXrcmUAMwmz9vBpnctn8shlZEeo5kDYahyyh/KdQ > > eXdit7dtZ5+dCVKSz0PUX4SM\\nkwIDAQAB\\n-----END PUBLIC KEY-----\", > \"result\": > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id":"ppklablinux30.locald > > omain_master","taken_at":"2017-04-18T13:14:13.000Z","processed_at":"2017-04-18T13:14:13.000Z","worker_id":"worker1"},{"id":5,"tag":"minion_start","data":"{\"_ > stamp\": > \"2017-04-18T13:14:14.191910\", \"pretag\": null, \"cmd\": > \"_minion_event\", \"tag\": \"minion_start\", \"data\": \"Minion ca > started at Tue Apr 18 13:14:14 2017\", > \"id\": > \"ca\"}","alter_time":"2017-04-18T13:14:14.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:18.000Z" > > ,"processed_at":"2017-04-18T13:14:18.000Z","worker_id":"worker1"},{"id":6,"tag":"salt/minion/ca/start","data":"{\"_stamp\": > \"2017-04-18T13:14:14.201405\", \" > pretag\": null, \"cmd\": \"_minion_event\", \"tag\": > \"salt/minion/ca/start\", \"data\": \"Minion ca started at Tue Apr 18 > 13:14:14 2017\", \"id\": \"ca\"}"," > alter_time":"2017-04-18T13:14:14.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14:18.000Z","processed_at":"2017-04-18T13:14:1 > > 8.000Z","worker_id":"worker1"},{"id":7,"tag":"salt/auth","data":"{\"_stamp\": > \"2017-04-18T13:26:23.660263\", \"act\": \"accept\", \"id\": > \"ppklablinux31\", \"pub\": > \"-----BEGIN PUBLIC > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvRq1LkY//WVBG0iCfJO9\\n7a7O2HhXroisxycxfu5U99wmWMfOdQVo4arIe7N9hBo8M764/M4 > > WQcv2Ewozm6/t\\n3Ygy3nCcfohlwMvikcMbPgW/pxcIXfQkO68y+IbjOSjTPpvZtE3VFfpLkyZoAnkh\\no3tEJYgH+ULyiCI4NN6CgQ08rbhEkTmesRLuCfCZ0hjRJCyQDL0LUICxS+HQZPy0\\ne1TO2qvi > > kpOsY0AEWtg1a7KaXfn9KWaaiZvspRxqRdqI37zZwjzWItXCKIkORfP6\\ne4zZSzcI7GG1kM62yjrevNLBU+a7Z4JtOCqqc8RRUF6qiFH1/5/kRP+bDReVlWaa\\n5wIDAQAB\\n-----END > PUBLIC KEY-- ---\", \"result\": > true}","alter_time":"2017-04-18T13:26:23.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:26:23.000Z","proces > > sed_at":"2017-04-18T13:26:23.000Z","worker_id":"worker1"},{"id":8,"tag":"minion_start","data":"{\"_stamp\": > \"2017-04-18T13:26:24.533314\", \"pretag\": null, > \"cmd\": \"_minion_event\", \"tag\": \"minion_start\", > \"data\": \"Minion ppklablinux31 started at Tue Apr 18 13:26:24 2017\", > \"id\": \"ppklablinux31\"}","al > ter_time":"2017-04-18T13:26:24.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:26:28.000Z","processed_at":"2017-04-18T13:26:28. > > 000Z","worker_id":"worker1"},{"id":9,"tag":"salt/minion/ppklablinux31/start","data":"{\"_stamp\": > \"2017-04-18T13:26:24.540701\", \"pretag\": null, \"cmd\": \ > "_minion_event\", \"tag\": > \"salt/minion/ppklablinux31/start\", \"data\": \"Minion ppklablinux31 > started at Tue Apr 18 13:26:24 2017\", \"id\": \"ppklablinux3 > > 1\"}","alter_time":"2017-04-18T13:26:24.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:26:28.000Z","processed_at":"2017-04-18T > > 13:26:28.000Z","worker_id":"worker1"},{"id":10,"tag":"salt/auth","data":"{\"_stamp\": > \"2017-04-18T13:48:20.141772\", \"act\": \"accept\", \"id\": \"null-0050 > 568c7c69.pfizer.com > \", \"pub\": \"-----BEGIN PUBLIC > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx9fbcY1GOFMbmTJqOD2i\\nveCF4kySNJoQEq/ho6WxSonKI235 > > 8wIw+wKnATDsdlpBHh7mxsLK4YJOqGRNcXZD\\nB/ZulYbEDWy7w9kQb4FAKEjui1PkwacU/f9XVsySEX8au1ZskyMnsrzjnOpOvhyX\\n37miIe3h7qAvXTUzxjyr2tor1YbpEJSoR77B31SlWwtWsTfHMnEE > > 7fC5JjeK2426\\n7yI5n6AKst5SkMv9R07t2NJBqp17jVZvCLEaUkjWn5CKke5MvSBRAvZPMkNt5tch\\n80D3SN0JAh4rpVT4S6SfK4IVeFZ9KV4/3PpVhrc5odcRQDryJId3mbdFx8gauJk5\\nbQIDAQAB\ > \n-----END PUBLIC KEY-----\", > \"result\": > true}","alter_time":"2017-04-18T13:48:20.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18 > > T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z","worker_id":"worker1"},{"id":11,"tag":"minion_start","data":"{\"_stamp\": > \"2017-04-18T13:48:20.9301 29\", > \"pretag\": null, \"cmd\": \"_minion_event\", \"tag\": \"minion_start\", > \"data\": \"Minion null-0050568c7c69.pfizer.com > started at Tue Apr 18 13:48:20 > 2017\", \"id\": > \"null-0050568c7c69.pfizer.com > \"}","alter_time":"2017-04-18T13:48:20.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > > 18T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z","worker_id":"worker1"},{"id":12,"tag":"salt/minion/null-0050568c7c69.pfizer.com/start > ","data":"{\" > _stamp\": \"2017-04-18T13:48:20.938113\", \"pretag\": > null, \"cmd\": \"_minion_event\", \"tag\": > \"salt/minion/null-0050568c7c69.pfizer.com/start\ > ", \"data\": > \"Minion null-0050568c7c69.pfizer.com > started at Tue Apr 18 13:48:20 > 2017\", \"id\": \"null-0050568c7c69.pfizer.com > \"}","alter_time":"2017-04-18T13:48:20.000 > > Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z","worker_id":"worker1"},{"id" > > :13,"tag":"20170418135525163915","data":"{\"_stamp\": > \"2017-04-18T13:55:25.165892\", \"minions\": > [\"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:25.000 > > Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:25.000Z","processed_at":"2017-04-18T13:55:25.000Z","worker_id":"worker1"},{"id" > > :14,"tag":"salt/job/20170418135525163915/new","data":"{\"tgt_type\": > \"glob\", \"jid\": \"20170418135525163915\", \"tgt\": \"ppklablinux31\", > \"_stamp\": \"20 > 17-04-18T13:55:25.166238\", \"user\": \"saltapi\", \"arg\": [{\"key\": > \"roles\", \"val\": [\"kube-master\"], \"__kwarg__\": true}], \"fun\": > \"grains.append\ ", \"minions\": > [\"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:25.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:25.0 > > 00Z","processed_at":"2017-04-18T13:55:25.000Z","worker_id":"worker1"},{"id":15,"tag":"20170418135525237571","data":"{\"_stamp\": > \"2017-04-18T13:55:25.238994\ ", > \"minions\": [\"null-0050568c7c69.pfizer.com > \"]}","alter_time":"2017-04-18T13:55:25.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-0 > > 4-18T13:55:25.000Z","processed_at":"2017-04-18T13:55:25.000Z","worker_id":"worker1"},{"id":16,"tag":"salt/job/20170418135525237571/new","data":"{\"tgt_type\": > \"glob\", \"jid\": > \"20170418135525237571\", \"tgt\": \"null-0050568c7c69.pfizer.com > \", \"_stamp\": > \"2017-04-18T13:55:25.240617\", \"user\": \"saltapi\", \" > arg\": [{\"key\": \"roles\", \"val\": > [\"kube-minion\"], \"__kwarg__\": true}], \"fun\": \"grains.append\", > \"minions\": [\"null-0050568c7c69.pfizer.com > \"]}", > > "alter_time":"2017-04-18T13:55:25.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:25.000Z","processed_at":"2017-04-18T13:55: > > 25.000Z","worker_id":"worker1"},{"id":17,"tag":"salt/job/20170418135525237571/ret/null-0050568c7c69.pfizer.com > ","data":"{\"fun_args\": [{\"key\": > \"roles\", \ "val\": > [\"kube-minion\"]}], \"jid\": \"20170418135525237571\", \"return\": > {\"roles\": [\"kube-minion\"]}, \"retcode\": 0, \"success\": true, > \"cmd\": \"_ret urn\", \"_stamp\": > \"2017-04-18T13:55:26.092030\", \"fun\": \"grains.append\", \"id\": > \"null-0050568c7c69.pfizer.com > \"}","alter_time":"2017-04-18T13:55:26.00 > > 0Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:30.000Z","processed_at":"2017-04-18T13:55:30.000Z","worker_id":"worker1"},{"id > > ":18,"tag":"salt/job/20170418135525163915/ret/ppklablinux31","data":"{\"fun_args\": > [{\"key\": \"roles\", \"val\": [\"kube-master\"]}], \"jid\": > \"20170418135 525163915\", \"return\": > {\"roles\": [\"kube-master\"]}, \"retcode\": 0, \"success\": true, > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:26.105903\", > \"fun\": \"grains.append\", \"id\": > \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:26.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"201 > > 7-04-18T13:55:30.000Z","processed_at":"2017-04-18T13:55:30.000Z","worker_id":"worker1"},{"id":19,"tag":"salt/run/20170418135525317500/new","data":"{\"fun\": > \ "runner.state.orchestrate\", > \"fun_args\": [{\"mods\": \"orch.kubernetes\"}], \"jid\": > \"20170418135525317500\", \"user\": \"saltapi\", \"_stamp\": \"2017-04- > > 18T13:55:28.242578\"}","alter_time":"2017-04-18T13:55:28.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:30.000Z","processed > > _at":"2017-04-18T13:55:30.000Z","worker_id":"worker1"},{"id":20,"tag":"20170418135531035630","data":"{\"_stamp\": > \"2017-04-18T13:55:31.035957\", \"minions\": > [\"ca\", \"null-0050568303b8.pfizer.com > \", \"null-0050568c7c69.pfizer.com > \", > \"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklab > > linux30.localdomain_master","taken_at":"2017-04-18T13:55:35.000Z","processed_at":"2017-04-18T13:55:35.000Z","worker_id":"worker1"},{"id":21,"tag":"salt/job/20 > > 170418135531035630/new","data":"{\"tgt_type\": \"glob\", \"jid\": > \"20170418135531035630\", \"tgt\": \"*\", \"_stamp\": > \"2017-04-18T13:55:31.036328\", \"user > \": \"root\", \"arg\": [], \"fun\": \"mine.update\", \"minions\": > [\"ca\", \"null-0050568303b8.pfizer.com > \", \"null-0050568c7c69.pfizer.com > \", \"ppklablinux31 > > \"]}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:35.000Z","processed_at":"2017-04-18T > > 13:55:36.000Z","worker_id":"worker1"},{"id":22,"tag":"salt/job/20170418135531035630/ret/ca","data":"{\"fun_args\": > [], \"jid\": \"20170418135531035630\", \"re > turn\": null, \"retcode\": 0, \"success\": true, \"cmd\": > \"_return\", \"_stamp\": \"2017-04-18T13:55:31.081600\", \"fun\": > \"mine.update\", \"id\": \"ca\"}", > "alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55: > > 36.000Z","worker_id":"worker1"},{"id":23,"tag":"salt/job/20170418135531035630/ret/null-0050568c7c69.pfizer.com > ","data":"{\"fun_args\": [], > \"jid\": \"20170418 135531035630\", > \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": > \"_return\", \"_stamp\": \"2017-04-18T13:55:31.616291\", \"fun\": > \"mine.update\ ", \"id\": > \"null-0050568c7c69.pfizer.com > \"}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13 > > :55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_id":"worker1"},{"id":24,"tag":"salt/job/20170418135531035630/ret/ppklablinux31","data":"{\"fun_ > args\": [], \"jid\": > \"20170418135531035630\", \"return\": true, \"retcode\": 0, \"success\": > true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:31.63 > 5163\", \"fun\": \"mine.update\", \"id\": > \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at > > ":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_id":"worker1"},{"id":25,"tag":"20170418135536062539","data":"{\"_stamp\": > \"201 7-04-18T13:55:36.064042\", > \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:55:36.000Z","master_id":"ppklablinux30.localdomain_ma > > ster","taken_at":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_id":"worker1"},{"id":26,"tag":"salt/job/20170418135536062539/new > ","data":"{\"tgt_type\": \"list\", > \"jid\": \"20170418135536062539\", \"tgt\": > [\"null-0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:55:36.064366\", > \"user\": \"root\", \"arg\": [\"20170418135531035630\"], \"fun\": > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017 > > -04-18T13:55:36.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z","worker_i > > d":"worker1"},{"id":27,"tag":"20170418135546241343","data":"{\"_stamp\": \"2017-04-18T13:55:46.241646\", > \"minions\": [\"ca\", \"null-0050568303b8.pfizer.com > \ > ", \"null-0050568c7c69.pfizer.com > \", > \"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2 > > 017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"worker1"},{"id":28,"tag":"salt/job/20170418135546241343/new","data":"{\"tgt_ty > pe\": \"glob\", \"jid\": > \"20170418135546241343\", \"tgt\": \"*\", \"_stamp\": > \"2017-04-18T13:55:46.242055\", \"user\": \"root\", \"arg\": [], > \"fun\": \"sal tutil.refresh_pillar\", > \"minions\": [\"ca\", \"null-0050568303b8.pfizer.com > \", \"null-0050568c7c69.pfizer.com > \", > \"ppklablinux31\"]}","alter_time":"2017-04-1 > > 8T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"w > > orker1"},{"id":29,"tag":"salt/job/20170418135546241343/ret/null-0050568c7c69.pfizer.com > ","data":"{\"fun_args\": [], > \"jid\": \"20170418135546241343\", \"retur > n\": true, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", > \"_stamp\": \"2017-04-18T13:55:46.303253\", \"fun\": > \"saltutil.refresh_pillar\", \"id\": > \"null-0050568c7c69.pfizer.com > \"}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:46.000Z > > ","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"worker1"},{"id":30,"tag":"salt/job/20170418135546241343/ret/ppklablinux31","data":"{\"fun_args\": > [], \"jid\": \"20170418135546241343\", > \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": > \"_return\", \"_stamp\": \"2017-04-18T13:55:46.308953\", \"f > un\": \"saltutil.refresh_pillar\", \"id\": > \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","taken_a > > t":"2017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13:55:46.000Z","worker_id":"worker1"},{"id":31,"tag":"salt/job/20170418135546241343/ret/ca","data":"{ > \"fun_args\": [], \"jid\": > \"20170418135546241343\", \"return\": true, \"retcode\": 0, \"success\": > true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55 > :46.533656\", \"fun\": \"saltutil.refresh_pillar\", > \"id\": > \"ca\"}","alter_time":"2017-04-18T13:55:46.000Z","master_id":"ppklablinux30.localdomain_master","t > > aken_at":"2017-04-18T13:55:51.000Z","processed_at":"2017-04-18T13:55:51.000Z","worker_id":"worker1"},{"id":32,"tag":"20170418135551309779","data":"{\"_stamp\" > : \"2017-04-18T13:55:51.311099\", > \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:55:51.000Z","master_id":"ppklablinux30.localdo > > main_master","taken_at":"2017-04-18T13:55:51.000Z","processed_at":"2017-04-18T13:55:51.000Z","worker_id":"worker1"},{"id":33,"tag":"salt/job/20170418135551309 > 779/new","data":"{\"tgt_type\": > \"list\", \"jid\": \"20170418135551309779\", \"tgt\": > [\"null-0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:55:51.31 1436\", > \"user\": \"root\", \"arg\": [\"20170418135546241343\"], \"fun\": > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time > > ":"2017-04-18T13:55:51.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:55:51.000Z","processed_at":"2017-04-18T13:55:51.000Z","w > > orker_id":"worker1"},{"id":34,"tag":"20170418135601489588","data":"{\"_stamp\": > \"2017-04-18T13:56:01.489905\", \"minions\": [\"ca\", > \"null-0050568303b8.pfiz er.com > \"]}","alter_time":"2017-04-18T13:56:01.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:01.000Z","processed_at":"2017- > > 04-18T13:56:01.000Z","worker_id":"worker1"},{"id":35,"tag":"salt/job/20170418135601489588/new","data":"{\"tgt_type\": > \"grain\", \"jid\": \"201704181356014895 > 88\", \"tgt\": \"roles:ca\", \"_stamp\": > \"2017-04-18T13:56:01.492098\", \"user\": \"root\", \"arg\": > [{\"queue\": false, \"concurrent\": false, \"saltenv\": > \"base\", \"__kwarg__\": true}], \"fun\": > \"state.highstate\", \"minions\": [\"ca\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:01.000 > > Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:01.000Z","processed_at":"2017-04-18T13:56:01.000Z","worker_id":"worker1"},{"id" > > :36,"tag":"20170418135606552474","data":"{\"_stamp\": > \"2017-04-18T13:56:06.552868\", \"minions\": [\"ca\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":" > > 2017-04-18T13:56:06.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:06.000Z","processed_at":"2017-04-18T13:56:06.000Z","work > > er_id":"worker1"},{"id":37,"tag":"salt/job/20170418135606552474/new","data":"{\"tgt_type\": > \"list\", \"jid\": \"20170418135606552474\", \"tgt\": [\"ca\", \"n > ull-0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:56:06.553728\", \"user\": \"root\", \"arg\": > [\"20170418135601489588\"], \"fun\": \"saltutil.find_ > job\", \"minions\": [\"ca\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:06.000Z","master_id":"ppklablinux30.localdomain_master","taken > > _at":"2017-04-18T13:56:06.000Z","processed_at":"2017-04-18T13:56:06.000Z","worker_id":"worker1"},{"id":38,"tag":"salt/job/20170418135606552474/ret/ca","data": > "{\"fun_args\": > [\"20170418135601489588\"], \"jid\": \"20170418135606552474\", > \"return\": {\"tgt_type\": \"grain\", \"jid\": \"20170418135601489588\", > \"tgt\ ": \"roles:ca\", \"pid\": 86, > \"ret\": \"\", \"user\": \"root\", \"arg\": [{\"queue\": false, > \"concurrent\": false, \"saltenv\": \"base\", \"__kwarg__\": tru > e}], \"fun\": \"state.highstate\"}, > \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": > \"2017-04-18T13:56:06.608556\", \"fun\": \"saltutil.f > ind_job\", \"id\": > \"ca\"}","alter_time":"2017-04-18T13:56:06.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:06.000Z","proc > > essed_at":"2017-04-18T13:56:06.000Z","worker_id":"worker1"},{"id":39,"tag":"salt/job/20170418135601489588/ret/ca","data":"{\"fun_args\": > [{\"queue\": false, \ "concurrent\": > false, \"saltenv\": \"base\"}], \"jid\": \"20170418135601489588\", > \"return\": > {\"file_|-/etc/pki/issued_certs_|-/etc/pki/issued_certs_|-direct > ory\": {\"comment\": \"Directory > /etc/pki/issued_certs updated\", \"pchanges\": > {\"/etc/pki/issued_certs\": {\"directory\": \"new\"}}, \"name\": > \"/etc/pki/is sued_certs\", > \"start_time\": \"13:56:07.194634\", \"result\": true, \"duration\": > 1.281, \"__run_num__\": 6, \"changes\": {\"/etc/pki/issued_certs\": > \"New D ir\"}, \"__id__\": > \"/etc/pki/issued_certs\"}, \"group_|-kube_group_|-kube_|-present\": > {\"comment\": \"New group kube created\", \"name\": \"kube\", \"start_ > time\": \"13:56:03.585602\", \"result\": > true, \"duration\": 492.98, \"__run_num__\": 2, \"changes\": > {\"passwd\": \"x\", \"gid\": 492, \"name\": \"kube\", \" > members\": []}, \"__id__\": \"kube_group\"}, > \"file_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-managed\": {\"comment\": > \"File /etc/pki/ca.crt exists with proper p > ermissions. No changes made.\", \"pchanges\": {}, \"name\": > \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.521611\", \"result\": > true, \"duration\": 0.817, \ > "__run_num__\": 10, \"changes\": {}, \"__id__\": \"/etc/pki/ca.crt\"}, > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-manage > d\": {\"comment\": \"File > /etc/zypp/repos.d/containers.repo updated\", \"pchanges\": {}, \"name\": > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13 > :56:03.255349\", \"result\": true, \"duration\": > 162.91, \"__run_num__\": 0, \"changes\": {\"diff\": \"New file\", > \"mode\": \"0644\"}, \"__id__\": \"/etc/zyp > p/repos.d/containers.repo\"}, > \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory > /etc/pki is in the correct state\", \"pchanges\": {}, \"na > me\": \"/etc/pki\", \"start_time\": > \"13:56:07.193414\", \"result\": true, \"duration\": 1.082, > \"__run_num__\": 5, \"changes\": {}, \"__id__\": \"/etc/pki\"} > , \"file_|-/etc/motd_|-/etc/motd_|-managed\": > {\"comment\": \"File /etc/motd updated\", \"pchanges\": {}, \"name\": > \"/etc/motd\", \"start_time\": \"13:56:03. > 418415\", \"result\": true, \"duration\": 145.221, \"__run_num__\": > 1, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -0,0 +1,3 @@\\n+Welcome to > ppklablinux30.loc aldomain.\\n+The > roles of this node are:\\n+ - ca\\n\"}, \"__id__\": \"/etc/motd\"}, > \"x509_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-certificate_managed\": {\"c > omment\": \"File /etc/pki/ca.crt > updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.crt\", > \"start_time\": \"13:56:08.483311\", \"result\": true, \"duration > \": 38.149, \"__run_num__\": 9, \"changes\": > {\"Certificate\": {\"New\": {\"Not After\": \"2027-04-16 13:56:08\", > \"X509v3 Extensions\": {\"subjectKeyIdentifi > er\": > \"51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\", > \"keyUsage\": \"critical Certificate Sign, CRL Sign\", > \"authorityKeyIdentifier\": \"ke > yid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.m > > ahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > ", > \"basicConstraints\": \"critical CA:TRUE\"}, \"Subject Hash\": > \"2F:0B:83:D6\", \"MD5 Finge r Print\": > \"A5:99:B1:1C:A3:48:E9:64:86:35:24:7F:41:1F:00:90\", \"SHA1 Finger > Print\": > \"20:2A:25:0D:0B:2F:91:E8:3F:92:F3:2B:7F:8A:C5:37:F1:1E:15:09\", \"SHA- > 256 Finger Print\": > \"BF:C2:6C:31:46:B9:50:13:A2:E7:AD:BF:54:5E:FB:E5:C2:4C:E1:38:5A:0A:80:BC:AD:FC:79:92:24:E8:A8:97\", > \"Serial Number\": \"F1:3D:64:29:EA:0 > 9:37:80\", \"Version\": 3, \"Key Size\": 4096, \"Public Key\": > \"-----BEGIN PUBLIC > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UIXB43n > > \\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ng8cvSHNvUx6f6R1tTbw/a > > SsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuT > > QOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhk > > UdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN792kR823ed734CmUvl3hEe > > AlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END > PUBLIC KEY-----\\n\", \"Subject\": {\"C\": \"US\", \"organizationName\": > \"Pfizer\", \"CN\": \"localdomain\", > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > \"hari.mahadevan at pfizer.com \", > \"GN\": \"None\", \"surname\": \ > "None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > Before\": \"2017-04-18 13:56:08\", \"Issuer\": {\"C\": \"US\", > \"organizationName\": \"Pfiz er\", > \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > \"emailAddress\": \"hari.mahadevan at pfizer.com > \", \"GN\": \"None\", \"surname\": > \"None\ ", \"OU\": \"BTI\"}}, \"Old\": > \"/etc/pki/ca.crt does not exist.\"}}, \"__id__\": \"/etc/pki/ca.crt\"}, > \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\ > ": {\"comment\": \"Package python-M2Crypto is already > installed\", \"name\": \"python-M2Crypto\", \"start_time\": > \"13:56:06.872964\", \"result\": true, \"dur > ation\": 320.254, \"__run_num__\": 4, \"changes\": {}, \"__id__\": > \"python-M2Crypto\"}, > \"x509_|-/etc/pki/ca.key_|-/etc/pki/ca.key_|-private_key_managed\": { > \"comment\": \"File /etc/pki/ca.key > updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", > \"start_time\": \"13:56:07.198826\", \"result\": true, \"durat > ion\": 1282.75, \"__run_num__\": 7, \"changes\": > \"New private key generated\", \"__id__\": \"/etc/pki/ca.key\"}, > \"file_|-/etc/pki/ca.key_|-/etc/pki/ca.key_| > -managed\": {\"comment\": \"\", \"pchanges\": {}, \"name\": > \"/etc/pki/ca.key\", \"start_time\": \"13:56:08.481733\", \"result\": > true, \"duration\": 1.035, \ > "__run_num__\": 8, \"changes\": {\"mode\": \"0600\"}, \"__id__\": > \"/etc/pki/ca.key\"}, \"user_|-kube_user_|-kube_|-present\": > {\"comment\": \"New user kube c > reated\", \"name\": \"kube\", \"start_time\": \"13:56:04.094251\", > \"result\": true, \"duration\": 602.999, \"__run_num__\": 3, > \"changes\": {\"shell\": \"/bi > n/bash\", \"workphone\": \"\", \"uid\": 1000, \"passwd\": \"x\", > \"roomnumber\": \"\", \"gid\": 100, \"groups\": [\"kube\", \"users\"], > \"home\": \"\", \"full name\": \"\", > \"homephone\": \"\", \"name\": \"kube\"}, \"__id__\": \"kube_user\"}, > \"module_|-mine.send_|-mine.send_|-run\": {\"comment\": \"Module > function mine.send executed\", > \"name\": \"mine.send\", \"start_time\": \"13:56:08.526443\", > \"result\": true, \"duration\": 522.106, \"__run_num__\": 11, > \"changes\": {\"ret\": true}, > \"__id__\": \"mine.send\"}}, \"retcode\": 0, \"success\": true, \"cmd\": > \"_return\", \"_stamp\": \"2017-04-18T13:56:09.056508\", \"fun\": \ > "state.highstate\", \"id\": \"ca\", > \"out\": > \"highstate\"}","alter_time":"2017-04-18T13:56:09.000Z","master_id":"ppklablinux30.localdomain_master","taken_at" > > :"2017-04-18T13:56:11.000Z","processed_at":"2017-04-18T13:56:11.000Z","worker_id":"worker1"},{"id":40,"tag":"20170418135616772289","data":"{\"_stamp\": > \"2017 -04-18T13:56:16.772711\", > \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:16.000Z","master_id":"ppklablinux30.localdomain_mas > > ter","taken_at":"2017-04-18T13:56:21.000Z","processed_at":"2017-04-18T13:56:21.000Z","worker_id":"worker1"},{"id":41,"tag":"salt/job/20170418135616772289/new" > ,"data":"{\"tgt_type\": \"list\", > \"jid\": \"20170418135616772289\", \"tgt\": > [\"null-0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:56:16.773239\", > \"user\": \"root\", \"arg\": [\"20170418135601489588\"], \"fun\": > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017- > > 04-18T13:56:16.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:21.000Z","processed_at":"2017-04-18T13:56:21.000Z","worker_id > > ":"worker1"},{"id":42,"tag":"20170418135626951275","data":"{\"_stamp\": > \"2017-04-18T13:56:26.951551\", \"minions\": [\"ppklablinux31\", > \"null-0050568303b8.p fizer.com > \"]}","alter_time":"2017-04-18T13:56:26.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:31.000Z","processed_at":"20 > > 17-04-18T13:56:31.000Z","worker_id":"worker1"},{"id":43,"tag":"salt/job/20170418135626951275/new","data":"{\"tgt_type\": > \"grain\", \"jid\": \"201704181356269 > 51275\", \"tgt\": \"roles:kube-master\", \"_stamp\": > \"2017-04-18T13:56:26.953461\", \"user\": \"root\", \"arg\": > [\"repositories,etcd-discovery\", {\"queue\" > : false, \"concurrent\": false, \"saltenv\": \"base\", > \"__kwarg__\": true}], \"fun\": \"state.sls\", \"minions\": > [\"ppklablinux31\", \"null-0050568303b8.pfi > zer.com > \"]}","alter_time":"2017-04-18T13:56:26.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:31.000Z","processed_at":"2017 > > -04-18T13:56:31.000Z","worker_id":"worker1"},{"id":44,"tag":"salt/job/20170418135626951275/ret/ppklablinux31","data":"{\"fun_args\": > [\"repositories,etcd-disc overy\", > {\"queue\": false, \"concurrent\": false, \"saltenv\": \"base\"}], > \"jid\": \"20170418135626951275\", \"return\": {\"cmd_|-set_size_|-curl > -L -X PUT > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size > -d value=1_|-run\": {\"comment\": \"Command \\\"curl -L -X PUT > http://ppklablinux > 30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size > -d > value=1\\\" run\", \"name\": \"curl -L -X PUT > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd > /registry/k8s/_config/size -d value=1\", \"start_time\": > \"13:56:31.855687\", \"result\": true, \"duration\": 80.902, > \"__run_num__\": 4, \"changes\": {\"pid\ > ": 3252, \"retcode\": 0, \"stderr\": \" % Total % Received % Xferd > Average Speed Time Time Time Current\\n > Dloa d Upload Total > Spent Left Speed\\n\\r 0 0 0 0 0 0 0 0 > --:--:-- --:--:-- --:--:-- 0\\r100 121 100 114 100 7 > 7709 473 --:--:-- --:--:-- --:--:-- > 8142\", \"stdout\": > \"{\\\"action\\\":\\\"set\\\",\\\"node\\\":{\\\"key\\\":\\\"/_etcd/registry/k8s/_config/size\\\ > > ",\\\"value\\\":\\\"1\\\",\\\"modifiedIndex\\\":6,\\\"createdIndex\\\":6}}\"}, > \"__id__\": \"set_size\"}, \"pkg_|-cleanup_|-etcdctl_|-installed\": > {\"comment\ ": \"Package etcdctl is > already installed\", \"name\": \"etcdctl\", \"start_time\": > \"13:56:30.443368\", \"result\": true, \"duration\": 481.147, > \"__run_num_ _\": 1, \"changes\": {}, > \"__id__\": \"cleanup\"}, > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": > {\"comment\": \ "File > /etc/zypp/repos.d/containers.repo updated\", \"pchanges\": {}, \"name\": > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > \"13:56:27.452640\", \"r esult\": true, > \"duration\": 196.93, \"__run_num__\": 0, \"changes\": {\"diff\": \"New > file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zypp/repos.d/containers > .repo\"}, \"cmd_|-cleanup_|-etcdctl > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > /_etcd/registry/k8s_|-run\": {\"comment\": \"check_cmd determined th > e state succeeded\", \"name\": \"etcdctl > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > /_etcd/registry/k8s\", \"start_time\": \"13:56:30.943924\", \"_ > _id__\": \"cleanup\", \"duration\": 897.534, > \"__run_num__\": 2, \"changes\": {\"pid\": 3246, \"retcode\": 4, > \"stderr\": \"Error: dial tcp [::1]:2379: getso > ckopt: connection refused\", \"stdout\": \"\"}, \"result\": > true}, \"pkg_|-set_size_|-curl_|-installed\": {\"comment\": \"Package > curl is already installed\", \"name\": > \"curl\", \"start_time\": \"13:56:31.841690\", \"result\": true, > \"duration\": 13.602, \"__run_num__\": 3, \"changes\": {}, \"__id__\": > \"set_size\ "}}, \"retcode\": 0, > \"success\": true, \"cmd\": \"_return\", \"_stamp\": > \"2017-04-18T13:56:31.950017\", \"fun\": \"state.sls\", \"id\": > \"ppklablinux31\", \ "out\": > \"highstate\"}","alter_time":"2017-04-18T13:56:31.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:36.000Z","processe > > d_at":"2017-04-18T13:56:36.000Z","worker_id":"worker1"},{"id":45,"tag":"20170418135632056163","data":"{\"_stamp\": > \"2017-04-18T13:56:32.056452\", \"minions\" > : [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:36. > > 000Z","processed_at":"2017-04-18T13:56:36.000Z","worker_id":"worker1"},{"id":46,"tag":"salt/job/20170418135632056163/new","data":"{\"tgt_type\": > \"list\", \"j id\": > \"20170418135632056163\", \"tgt\": [\"null-0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:56:32.056818\", \"user\": \"root\", \"arg\": [\"20170 > 418135626951275\"], \"fun\": > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:32.000Z","master_id":"ppk > > lablinux30.localdomain_master","taken_at":"2017-04-18T13:56:36.000Z","processed_at":"2017-04-18T13:56:36.000Z","worker_id":"worker1"},{"id":47,"tag":"20170418 > 135642239202","data":"{\"_stamp\": > \"2017-04-18T13:56:42.239530\", \"minions\": > [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:42.000Z"," > > master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:46.000Z","processed_at":"2017-04-18T13:56:46.000Z","worker_id":"worker1"},{"id":48, > > "tag":"salt/job/20170418135642239202/new","data":"{\"tgt_type\": > \"grain\", \"jid\": \"20170418135642239202\", \"tgt\": \"roles:etcd\", > \"_stamp\": \"2017-04- > 18T13:56:42.241642\", \"user\": \"root\", \"arg\": [{\"queue\": false, > \"concurrent\": true, \"saltenv\": \"base\", \"__kwarg__\": true}], > \"fun\": \"state.hi ghstate\", > \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:42.000Z","master_id":"ppklablinux30.localdomain_master","taken_at" > > :"2017-04-18T13:56:46.000Z","processed_at":"2017-04-18T13:56:46.000Z","worker_id":"worker1"},{"id":49,"tag":"20170418135647339774","data":"{\"_stamp\": > \"2017 -04-18T13:56:47.340292\", > \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:47.000Z","master_id":"ppklablinux30.localdomain_mas > > ter","taken_at":"2017-04-18T13:56:51.000Z","processed_at":"2017-04-18T13:56:51.000Z","worker_id":"worker1"},{"id":50,"tag":"salt/job/20170418135647339774/new" > ,"data":"{\"tgt_type\": \"list\", > \"jid\": \"20170418135647339774\", \"tgt\": > [\"null-0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:56:47.340837\", > \"user\": \"root\", \"arg\": [\"20170418135642239202\"], \"fun\": > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017- > > 04-18T13:56:47.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:56:51.000Z","processed_at":"2017-04-18T13:56:51.000Z","worker_id > > ":"worker1"},{"id":51,"tag":"20170418135657522690","data":"{\"_stamp\": > \"2017-04-18T13:56:57.523922\", \"minions\": > [\"null-0050568c7c69.pfizer.com \", > \"ppkl ablinux31\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:57.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18 > > T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":52,"tag":"salt/job/20170418135657522690/new","data":"{\"tgt_type\": > \"g rain_pcre\", \"jid\": > \"20170418135657522690\", \"tgt\": \"roles:kube-(master|minion)\", > \"_stamp\": \"2017-04-18T13:56:57.525807\", \"user\": \"root\", \"arg > \": [\"repositories,etcd-proxy\", > {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\", > \"__kwarg__\": true}], \"fun\": \"state.sls\", \"minions\": > [\"null-0050568c7c69.pfizer.com > \", \"ppklablinux31\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:56:57.000Z","master_id":"ppklablinux30.l > > ocaldomain_master","taken_at":"2017-04-18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":53,"tag":"20170418135700403535 > ","data":"{\"_stamp\": > \"2017-04-18T13:57:00.404046\", \"minions\": > [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_ > > master","taken_at":"2017-04-18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":54,"tag":"salt/job/20170418135700403535/n > ew","data":"{\"tgt_type\": \"glob\", > \"jid\": \"20170418135700403535\", \"tgt\": \"ca\", \"_stamp\": > \"2017-04-18T13:57:00.404541\", \"user\": \"root\", \"arg > \": [{\"signing_policy\": \"minion\", \"public_key\": > \"-----BEGIN PUBLIC > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGX > > OCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+ph > > lBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCc > > L1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+ > > B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2s > eUdGCmPTyLmhY90TmUMCAwEAAQ==-----END > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"ppklablinux31.localdomain\", > \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\ > ": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, > digitalSignature, keyEncipherment\", \"SN\": \"None\", > \"public_key_passphrase\": \"None\", \" > GN\": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": > \"hari.mahadevan at pfizer.com \", > \"basicConstraints\": \"critical CA:false\"}], \"fun\": \"x509.s > ign_remote_certificate\", \"minions\": > [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-1 > > 8T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":55,"tag":"salt/job/20170418135700403535/ret/ca","data":"{\"fun_args\": > [{\"signing_policy\": \"minion\", > \"public_key\": \"-----BEGIN PUBLIC > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGXOCH > > k0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBN > > rdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1x > > Uy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43 > > m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2seUd > GCmPTyLmhY90TmUMCAwEAAQ==-----END > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"ppklablinux31.localdomain\", > \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": > \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, > digitalSignature, keyEncipherment\", \"SN\": \"None\", > \"public_key_passphrase\": \"None\", \"GN\ > ": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": > \"hari.mahadevan at pfizer.com \", > \"basicConstraints\": \"critical CA:false\"}], \"jid\": \"201704181 > 35700403535\", \"return\": {\"Issuer Public > Key\": \"-----BEGIN PUBLIC > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UIXB43n\\nu/72U7XYV > > Pk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E > > 1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWK > > r7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk > > 2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN792kR823ed734CmUvl3hEeAlddNBtIhJij > > 1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END PUBLIC > KEY-----\\n\", \"Not After\": \"2017-07-27 13:57:00\", \"Subject Hash\": > \"03: 5E:85:4C\", \"Public Key\": > \"-----BEGIN PUBLIC > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBE\\nuXGuonX5+UGXOCHk0qj8onDaXX8acbDl > > Ncc+9JLOaMWEDgRn+4skZArYcbruEI1k\\nqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\nStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSS > > NPNtt9qu\\n7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQS\\npYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\nXqDAVDCcL1xUy > > 7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACG\\nIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\nXp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y > > +B43m3RZY3I0njhBqEqEINRZ6T/\\nK/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t > > 0E2\\nTt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n-----END PUBLIC KEY-----\\n\", > \"MD5 Finger Print\": > \"CF:98:45:78:E6:98:66:F5:7F:9C:EC:C3:24:A6:9D:75\", \"SHA1 Fing > er Print\": > \"35:54:DD:18:6B:B8:0A:7A:6B:E7:BC:08:F5:FD:A7:83:DB:01:9B:E7\", > \"SHA-256 Finger Print\": > \"35:E1:80:2E:BE:78:50:56:5C:42:EA:49:26:ED:33:6A:33:B0 > :03:E6:5C:4F:23:34:A4:3C:6B:29:E6:DA:50:BA\", \"Serial > Number\": \"E0:7E:3D:AB:59:B6:BC:7C\", \"Version\": 3, \"Key Size\": > 4096, \"X509v3 Extensions\": {\"su > bjectKeyIdentifier\": > \"FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\", > \"keyUsage\": \"critical Key Encipherment\", \"authorityKeyIdentifier\" > : > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress= > > hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > ", > \"basicConstraints\": \"critical CA:FALSE\"}, \"Subject\": {\"C\": > \"US\", \"organiza tionName\": > \"Pfizer\", \"CN\": \"ppklablinux31.localdomain\", \"SP\": \"NY\", > \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com > \", \"GN\" > : \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer > Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-18 13:57:00\", > \"Issuer\": {\"C\": \"US\", \" > organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": > \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > \"hari.mahadevan at pfizer.com \", > \"GN\": \"No ne\", \"surname\": > \"None\", \"OU\": \"BTI\"}}, \"retcode\": 0, \"success\": true, \"cmd\": > \"_return\", \"_stamp\": \"2017-04-18T13:57:00.502166\", \"fun\": > \"x509.sign_remote_certificate\", \"id\": > \"ca\"}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > > 18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":56,"tag":"20170418135700795320","data":"{\"_stamp\": > \"2017-04-18T13: 57:00.795617\", > \"minions\": > [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:01 > > .000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":57,"tag":"salt/job/20170418135700795320/new","data":"{\"tgt_type\": > \"glob\", \" jid\": > \"20170418135700795320\", \"tgt\": \"ca\", \"_stamp\": > \"2017-04-18T13:57:00.796050\", \"user\": \"root\", \"arg\": > [{\"signing_policy\": \"minion\", \ > "public_key\": \"-----BEGIN PUBLIC > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4s > > kZArYcbruEI1kqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfD > > wCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CU > > mZA/j/zWwok/fcACGIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2S > > QT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==-----END > PU BLIC KEY-----\", \"C\": \"US\", > \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUs > age\": \"nonRepudiation, digitalSignature, > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Emai > l\": \"hari.mahadevan at pfizer.com > \", \"basicConstraints\": \"critical > CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": > [\"ca\"]}","alter_t > ime":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z" > > ,"worker_id":"worker1"},{"id":58,"tag":"salt/job/20170418135700795320/ret/ca","data":"{\"fun_args\": > [{\"signing_policy\": \"minion\", \"public_key\": \"----- > BEGIN PUBLIC > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBEuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjme > > E0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+ > > CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtG > > yq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPs > > DP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==-----END > PUBLIC KEY-----\", \"C\" : \"US\", > \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > \"nonRepudiatio n, digitalSignature, > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Email\": > \"hari.mahadevan@ pfizer.com > \", \"basicConstraints\": \"critical CA:false\"}], > \"jid\": \"20170418135700795320\", \"return\": \"-----BEGIN > CERTIFICATE-----\\nMIIHFTCCBP2gAwIBAg > IJAMvg3ZLcfvbyMA0GCSqGSIb3DQEBCwUAMIGtMQswCQYD\\nVQQGEwJVUzEUMBIGA1UEAwwLbG9jYWxkb21haW4xFDASBgNVBAcMC1BlYXJsIFJp\\ndmVyMQswCQYDVQQIDAJOWTEPMA0GA1UECgwGUGZpem > > VyMQ0wCwYDVQQqDAROb25l\\nMQwwCgYDVQQLDANCVEkxKDAmBgkqhkiG9w0BCQEWGWhhcmkubWFoYWRldmFuQHBm\\naXplci5jb20xDTALBgNVBAQMBE5vbmUwHhcNMTcwNDE4MTM1NzAwWhcNMTcwNzI3\\ > > nMTM1NzAwWjCBuzELMAkGA1UEBhMCVVMxIjAgBgNVBAMMGXBwa2xhYmxpbnV4MzEu\\nbG9jYWxkb21haW4xFDASBgNVBAcMC1BlYXJsIFJpdmVyMQswCQYDVQQIDAJOWTEP\\nMA0GA1UECgwGUGZpemVyMQ0 > > wCwYDVQQqDAROb25lMQwwCgYDVQQLDANCVEkxKDAm\\nBgkqhkiG9w0BCQEWGWhhcmkubWFoYWRldmFuQHBmaXplci5jb20xDTALBgNVBAQM\\nBE5vbmUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoI > > CAQDM/FldJgEHX23i\\n0kaMcES5ca6idfn5QZc4IeTSqPyicNpdfxpxsOU1xz70ks5oxYQOBGf7iyRkCthx\\nuu4QjWSo9TnMyOZ4TRTGoHAAAmk6zAeJTcGrbyWmZd0dcjZdWpNtJWlZN+axItLM\\nnPrb > > 999K0JzZAUf39TG12VDa2R0i7AQXgh6RGJvuUReGcv6mGUE2t1Rl4nge1JI0\\n82232q7uNF8WyCvJc0gBu18PAJxX0USGKrG+BjsJ+nS734I2lnZVzqQdY6TQ1Ree\\nuRrwpBKlidl6rZnT//tx8VRUP5sE > > iKyHTrtq6Q9Uc0d19hqybMEcNy1gM5Omc8FT\\n6FyD+PFeoMBUMJwvXFTLuzgO92IPh5BBqDnWZlJi2nMYUQraqvbcJSZkD+P/NbCi\\nT99wAIYggK0bKrT+hWesrYBcEBWHnVUAf42eO5BYP8fL4Zyp2Av2 > > r8YLT6dx2v6J\\nPQCmXLxenVxBboyCIbB7txCCGCew8UQvvk+zyeLUaTtj4HjebdFljcjSeOEGoSoQ\\ng1FnpP8r945bDwt4UrZJBP14i3Wd40iRlOU7cu5Q+wM/+4wlrIVzNgfecNkxYmua\\nqEyUQJr8U > > dGG0vvaIapu/wzkAS7x9idpjUxPItsuZrGmyD+hOMRRYiN8CFaHySmE\\nN/m3QTZO3ax5R0YKY9PIuaFj3ROZQwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIw\\nADAOBgNVHQ8BAf8EBAMCBSAwHQYDVR0OB > > BYEFPw9Po44tac3Bs+N5SMxhfnE2y4M\\nMIHiBgNVHSMEgdowgdeAFFFzkENQf4q7m0JFGlFHRT9Nn1yZoYGzpIGwMIGtMQsw\\nCQYDVQQGEwJVUzEUMBIGA1UEAwwLbG9jYWxkb21haW4xFDASBgNVBAcMC > > 1BlYXJs\\nIFJpdmVyMQswCQYDVQQIDAJOWTEPMA0GA1UECgwGUGZpemVyMQ0wCwYDVQQqDARO\\nb25lMQwwCgYDVQQLDANCVEkxKDAmBgkqhkiG9w0BCQEWGWhhcmkubWFoYWRldmFu\\nQHBmaXplci5jb2 > > 0xDTALBgNVBAQMBE5vbmWCCQDxPWQp6gk3gDANBgkqhkiG9w0B\\nAQsFAAOCAgEAyiPp2gH4exF4OX7vUXlqXlqPQ6Np46k/Y8y/ExXZpBiTXtOBn+ku\\n/n4WPszTmRktjMO8Z5NIZhXbTabXNO3oy2v/r6 > > He6OLJVRfgxOLJ4UpkwilzeoBQ\\n3LLqrzFGUzVCefKELLNt/sNZZzJUvDjwbr0xF9FUQzTjJPFIl4yLK/JMe26A5it1\\nZtqgCLUWVD2GN1PaMi/xPOKjtPS4aCQg8GDrCpHXgvzxoFQO7BKbjR094W4IF7 > > 69\\nLENZfWkF6SbYlw/ONhXUmvRq9Td8usPl8o1OIWM7zkfwyCZDmK/5Ulht/vybllm+\\n7tib9wJvLmLQavGpJr1PpAZfS3GnscGOZgarpWFLkTyNSO4K5rMSj/K30klK7XsS\\nVM3fGWlzXmr0LSoKhVw > > w4q0XPmttipUvPcK4v6RqxEgm5iQ7jE8PNZpUCHSlNi3I\\n2tc9ukZoWQCXg/qrAf7mm/9aXkHA9+hODFhWZWQ69mCVQPZgqwJ9N7DUx8EVE6HV\\nLJYedlvh6HHucmDdYhh0/sj0yFCiAL9SaMkUD2fjnXf > > CAdY4Nh6VA+LbDn3SEtiN\\n+EseMG7Xa+uqYpBGC6gIAkdTabjJpVOSPU2dgjTFbRP/t0WI6UISeQQV6eB0EWDh\\n2fE0JDyhZk9f1iglCfT3KgftjKpYqSat0wd80tVrbwTZpLKzXNVLURU=\\n-----END > CERTIFICATE-----\\n\", \"retcode\": 0, > \"success\": true, \"cmd\": \"_return\", \"_stamp\": > \"2017-04-18T13:57:00.895052\", \"fun\": \"x509.sign_remote_certi > ficate\", \"id\": > \"ca\"}","alter_time":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:01.000Z","proce > > ssed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id":59,"tag":"20170418135702561962","data":"{\"_stamp\": > \"2017-04-18T13:57:02.562273\", \"minion > s\": [\"null-0050568c7c69.pfizer.com > \", \"ppklablinux31\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:02.000Z","master_id":"ppklablinu > > x30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":60,"tag":"salt/job/201704 > > 18135702561962/new","data":"{\"tgt_type\": \"list\", \"jid\": > \"20170418135702561962\", \"tgt\": [\"null-0050568c7c69.pfizer.com > \", \"ppklablinux31\", \"null- > 0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:57:02.562671\", \"user\": \"root\", \"arg\": > [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\ > ", \"minions\": [\"null-0050568c7c69.pfizer.com > \", \"ppklablinux31\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:02.000Z","master_id": > > "ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":61,"tag":"salt > > /job/20170418135702561962/ret/null-0050568c7c69.pfizer.com > ","data":"{\"fun_args\": > [\"20170418135657522690\"], \"jid\": \"20170418135702561962\", > \"return\": {\"tgt_type\": > \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": > \"roles:kube-(master|minion)\", \"pid\": 3113, \"ret\": \"\", \"user\": > \"root\", \ "arg\": > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, > \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\"}, > \"retcod e\": 0, \"success\": true, > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:02.604513\", > \"fun\": \"saltutil.find_job\", \"id\": \"null-0050568c7c69.pfize > r.com > \"}","alter_time":"2017-04-18T13:57:02.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04 > > -18T13:57:06.000Z","worker_id":"worker1"},{"id":62,"tag":"salt/job/20170418135702561962/ret/ppklablinux31","data":"{\"fun_args\": > [\"20170418135657522690\"], \"jid\": > \"20170418135702561962\", \"return\": {\"tgt_type\": \"grain_pcre\", > \"jid\": \"20170418135657522690\", \"tgt\": > \"roles:kube-(master|minion)\", \"pi > d\": 3261, \"ret\": \"\", \"user\": \"root\", \"arg\": > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, > \"saltenv\": \"base\", \"__kwarg __\": > true}], \"fun\": \"state.sls\"}, \"retcode\": 0, \"success\": true, > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:02.608875\", > \"fun\": \"saltuti l.find_job\", > \"id\": > \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:02.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57: > > 06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":63,"tag":"20170418135704699378","data":"{\"_stamp\": > \"2017-04-18T13:57:04.699 809\", > \"minions\": > [\"ca\"]}","alter_time":"2017-04-18T13:57:04.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","p > > rocessed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":64,"tag":"salt/job/20170418135704699378/new","data":"{\"tgt_type\": > \"glob\", \"jid\": \" > 20170418135704699378\", \"tgt\": \"ca\", \"_stamp\": > \"2017-04-18T13:57:04.700563\", \"user\": \"root\", \"arg\": > [{\"signing_policy\": \"minion\", \"public_k > ey\": \"-----BEGIN PUBLIC > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSz > > xL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZr > > vm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 > > KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+d > > PdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > PUBLIC KEY- ----\", \"C\": \"US\", > \"CN\": \"null-0050568c7c69.pfizer.com > \", \"L\": \"Pearl River\", \"O\": > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > \"nonRepudiation, digitalSignature, > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"testrun\": > true, \"Email\": \"hari.mahadevan at pfizer.com > \", \"basicConstraints\": \"critical > CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": > [\"ca\ > "]}","alter_time":"2017-04-18T13:57:04.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T1 > > 3:57:06.000Z","worker_id":"worker1"},{"id":65,"tag":"salt/job/20170418135704699378/ret/ca","data":"{\"fun_args\": > [{\"signing_policy\": \"minion\", \"public_k > ey\": \"-----BEGIN PUBLIC > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSz > > xL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZr > > vm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 > > KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+d > > PdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > PUBLIC KEY- ----\", \"C\": \"US\", > \"CN\": \"null-0050568c7c69.pfizer.com > \", \"L\": \"Pearl River\", \"O\": > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > \"nonRepudiation, digitalSignature, > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"testrun\": > true, \"Email\": \"hari.mahadevan at pfizer.com > \", \"basicConstraints\": \"critical > CA:false\"}], \"jid\": \"20170418135704699378\", \"return\": {\"Issuer > Publi c Key\": \"-----BEGIN PUBLIC > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UIXB43n\\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8 > > kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lG > > rDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOI > > gYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmF > > EECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN792kR823ed734CmUvl3hEeAlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xy > FImAQEQBSUCAwEAAQ==\\n-----END PUBLIC > KEY-----\\n\", \"Not After\": \"2017-07-27 13:57:04\", \"Subject Hash\": > \"0F:F8:79:4C\", \"Public Key\": \"-----BEGIN P > UBLIC > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48\\nAI+NcJg > > Laa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9 > > NgBWLGNfndRWaSVjF6flFn2feylfJgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh > > 3KSkUeyQh\\nU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/\\n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\neNAIdetOQuzr > > /EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi8\\n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n- > ----END PUBLIC KEY-----\\n\", \"MD5 > Finger Print\": \"63:69:7F:B6:C5:DB:8D:3A:1B:A3:0A:C4:7B:7E:72:D9\", > \"SHA1 Finger Print\": \"C1:6E:EB:2F:9C:3F:8F:2E:51:5 > C:5B:B9:EA:8D:C6:9A:99:2A:C4:92\", \"SHA-256 Finger > Print\": > \"22:75:34:23:78:30:65:31:9F:42:4F:DD:62:40:EE:7C:08:6E:89:BD:AE:F8:50:B4:09:F4:75:FE:BB:94:CB:C5 > \", \"Serial Number\": > \"70:1A:5D:73:54:F5:98:12\", \"Version\": 3, \"Key Size\": 4096, > \"X509v3 Extensions\": {\"subjectKeyIdentifier\": \"15:A9:34:9A:0C:C6: > > 72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", \"keyUsage\": \"critical > Key Encipherment\", \"authorityKeyIdentifier\": > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45 > :1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.mahadevan at pfizer.com/SN=None\\nserial > > :F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": > \"critical CA:FALSE\"}, \"Subject\": {\"C\": \"US\", > \"organizationName\": \"Pfizer\", \"CN\": \"null-005 > 0568c7c69.pfizer.com \", > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > \"hari.mahadevan at pfizer.com \", > \"GN\": \"None\", \"surname\": \"None\", \"OU > \": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": > \"2017-04-18 13:57:04\", \"Issuer\": {\"C\": \"US\", > \"organizationName\": \"Pfizer\", \"CN\": > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > \"emailAddress\": \"hari.mahadevan at pfizer.com > \", \"GN\": \"None\", \"surname\": > \"None\", \"OU\": \" BTI\"}}, > \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": > \"2017-04-18T13:57:04.783393\", \"fun\": > \"x509.sign_remote_certificate\", \"id\ > ": > \"ca\"}","alter_time":"2017-04-18T13:57:04.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017- > > 04-18T13:57:06.000Z","worker_id":"worker1"},{"id":66,"tag":"20170418135705080506","data":"{\"_stamp\": > \"2017-04-18T13:57:05.080798\", \"minions\": [\"ca\"]}" > > ,"alter_time":"2017-04-18T13:57:05.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57 > > :06.000Z","worker_id":"worker1"},{"id":67,"tag":"salt/job/20170418135705080506/new","data":"{\"tgt_type\": > \"glob\", \"jid\": \"20170418135705080506\", \"tgt\ > ": \"ca\", \"_stamp\": \"2017-04-18T13:57:05.081172\", > \"user\": \"root\", \"arg\": [{\"signing_policy\": \"minion\", > \"public_key\": \"-----BEGIN PUBLIC KEY- > ----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48AI+NcJgLaa5aV+B9xoiq5uME4X > > DcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2fe > > ylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8 > > hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8n > > Xt8NM3yH1Hi809LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": > \"null-0050568c7c69.pfizer.com > \", \"L\": \"Pearl River\", \"O\": > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > \"nonRepudiation, digitalSign ature, > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Email\": > \"hari.mahadevan at pfizer.com \", > \"basicConstraints\": \"critical > CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": > [\"ca\"]}","alter_time":"2017-04-18T13:57:05.000Z","mas > > ter_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_id":"worker1"},{"id":68,"ta > > g":"salt/job/20170418135705080506/ret/ca","data":"{\"fun_args\": > [{\"signing_policy\": \"minion\", \"public_key\": \"-----BEGIN PUBLIC > KEY-----MIICIjANBgkqhki > G9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHP > > d0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG0 > > 1ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4 > > to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUFhh > > yuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"null-0050568c7c6 > 9.pfizer.com \", \"L\": > \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, > \"keyUsage\": \"nonRepudiation, digitalSignature, keyEncipherm > ent\", \"SN\": \"None\", > \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", > \"Email\": \"hari.mahadevan at pfizer.com > \", \"basicConstraints\ > ": \"critical CA:false\"}], \"jid\": > \"20170418135705080506\", \"return\": \"-----BEGIN > CERTIFICATE-----\\nMIIHFzCCBP+gAwIBAgIIJbV/iVovLrEwDQYJKoZIhvcNAQELBQA > > wga0xCzAJBgNV\\nBAYTAlVTMRQwEgYDVQQDDAtsb2NhbGRvbWFpbjEUMBIGA1UEBwwLUGVhcmwgUml2\\nZXIxCzAJBgNVBAgMAk5ZMQ8wDQYDVQQKDAZQZml6ZXIxDTALBgNVBCoMBE5vbmUx\\nDDAKBgNV > > BAsMA0JUSTEoMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2YW5AcGZp\\nemVyLmNvbTENMAsGA1UEBAwETm9uZTAeFw0xNzA0MTgxMzU3MDVaFw0xNzA3Mjcx\\nMzU3MDVaMIG+MQswCQYDVQQGEwJVUzEl > > MCMGA1UEAwwcbnVsbC0wMDUwNTY4Yzdj\\nNjkucGZpemVyLmNvbTEUMBIGA1UEBwwLUGVhcmwgUml2ZXIxCzAJBgNVBAgMAk5Z\\nMQ8wDQYDVQQKDAZQZml6ZXIxDTALBgNVBCoMBE5vbmUxDDAKBgNVBAsM > > A0JUSTEo\\nMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2YW5AcGZpemVyLmNvbTENMAsGA1UE\\nBAwETm9uZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALCcIkLw9p8h\\nj+iGifBWb+uTu > > 2+iI8nFn5Ft2Sra2lQpRUshGfefKl0idZ1FZnWL7igIhpl3lE4t\\nGbr0s8S+PACPjXCYC2muWlfgfcaIqubjBOFw3KLQ8DUZ6rfiX1Unhz3dB3AOWoEi\\nIRvdwaex/qUtBmL2FzqbRf8eI43dvYydZ2RIb > > jeEbz0ytg9cZzQ/nGqTJ11wKCMq\\nUIO1qM5pdwmmYTOr95bXoCgDjJrtm2UIq2a75vG/TYAVixjX53UVmklYxen5RZ9n\\n3spXyYHgRdpNCSvU38htNREfPp+HBHVIfvM8xikt20RqwZ7zTvQNxlmkeD4hi > > /wf\\nb6omRp+FJ7bJIkM/YwdapUo6jWu8Prkq8nv0Y8bAKTcSyyvDqOE7OS0gWLFSfMgo\\ndykpFHskIVOf4iduncshA8J28+ntZcvIUS+sqKH0RwE6uZvPSeLaOlKAY7oFlq0a\\nUF7DgZvfP9OHVningm > > bkTc0fmB7oHTVMz3bP9dVxb7lfM4sb0r1nLU5vz44pBcy2\\nC0DM7kHDw3jQCHXrTkLs6/xBAQUn4PnT3XnSDlgWTAGckZB/kZ2uj8JMVyT/J17f\\nDTN8h9R4vNPS1BYYcrl3IvD0MxL1RHH6S6KdGveRiR > > 5zYNtcbVKFu1cYtNFdU6R+\\njFr5fmaJsfcvAkIERrib1qp697tw0149AgMBAAGjggEmMIIBIjAMBgNVHRMBAf8E\\nAjAAMA4GA1UdDwEB/wQEAwIFIDAdBgNVHQ4EFgQUFak0mgzGcqg0vtmHK1RMEU9f\\ > > nJZswgeIGA1UdIwSB2jCB14AUUXOQQ1B/irubQkUaUUdFP02fXJmhgbOkgbAwga0x\\nCzAJBgNVBAYTAlVTMRQwEgYDVQQDDAtsb2NhbGRvbWFpbjEUMBIGA1UEBwwLUGVh\\ncmwgUml2ZXIxCzAJBgNVBAg > > MAk5ZMQ8wDQYDVQQKDAZQZml6ZXIxDTALBgNVBCoM\\nBE5vbmUxDDAKBgNVBAsMA0JUSTEoMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2\\nYW5AcGZpemVyLmNvbTENMAsGA1UEBAwETm9uZYIJAPE9ZCn > > qCTeAMA0GCSqGSIb3\\nDQEBCwUAA4ICAQBsesVZM1ATYgejY/OdqyLoS69/Fza7G1PLY8cq22Y7u4DrLg01\\nCGyqaXis+hdKPUpCY7lkmL+Mdiy3oL5T7NigXODHtjLpCuyplVpXqvQlQuqNW8ph\\nkNqU > > VS54+N5vfbTmY8pAHRbvvVHBakFfpWrrtTtgWEj1v9e1a79NkchVbPKmSI+z\\nnv4gxZmuOVc24Ci10PGNfIue01cFR0ZGHBGns/8RfJvo32s0NvkM3GPy/kqkkMtX\\n8O2tp4YJKoh3sSZzQb8mhoxKL9IM > > yiNwHYPSiySHSDplyFk+g9TlVyjrpV30s8CP\\nvtV0TtY3ZsdVMECI/tp8tSHvOjoYxYiio8aXCwoGNFbD5IADk9KhPVkJN3O/Cd7n\\nypg04MP7MWmmrH9tcIbyshUgn11v/3SER5WZ9V1HDh6wRFzajByn > > K0wFHwG3fzTz\\nuYizwEB2nQNt3adNvZLbxsRRviFFpdipXFP6E1uwkj0Hcrgiz298rsqqu+5iAUuc\\nZgED519/cCQNevVWphnH7tHLenkXahRZerBG78YxHNehpuykGu1XHPoQMGWWmCE0\\ndlkxg/1HT > > yy/HJSDImsYd25J9NsCBo3/OibwQTFSx59jkC1FcHq5pNLEAX+b178Q\\niP0nMLxqobG11dcErKZkwDsW7zEJTxHy62/V11vlVC5h8Kmuxh+JGCgTgg==\\n-----END > CERTIFICATE-----\\n\", \"ret code\": 0, > \"success\": true, \"cmd\": \"_return\", \"_stamp\": > \"2017-04-18T13:57:05.178683\", \"fun\": > \"x509.sign_remote_certificate\", \"id\": \"ca\"}","a > > lter_time":"2017-04-18T13:57:05.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06 > > .000Z","worker_id":"worker1"},{"id":69,"tag":"salt/job/20170418135657522690/ret/null-0050568c7c69.pfizer.com > ","data":"{\"fun_args\": > [\"repositories,etcd-prox y\", > {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\"}], > \"jid\": \"20170418135657522690\", \"return\": > {\"file_|-/etc/pki/trust/anchors/SUSE_Ca > aSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": > {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists > with proper permission s. No changes > made.\", \"pchanges\": {}, \"name\": > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > \"13:57:02.868940\", \"result\": true, \"dura > tion\": 0.844, \"__run_num__\": 5, \"changes\": {}, \"__id__\": > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > \"user_|-etcd_|-etcd_|-present\": {\"comment\": > \"User etcd is present and up to date\", \"name\": \"etcd\", > \"start_time\": \"13:57:05.450830\", \"result\": true, \"duration\": > 1.177, \"__run_num__\": 11, > \"changes\": {}, \"__id__\": \"etcd\"}, > \"iptables_|-etcd_|-etcd_|-append\": {\"comment\": \"Set iptables rule > for etcd to: /usr/sbin/iptables --wait -t filt > er -A INPUT -p tcp -m state --state NEW -m multiport --dports > 2379,2380,4001 --jump ACCEPT for ipv4\", \"name\": \"etcd\", > \"start_time\": \"13:57:05.500990\ ", > \"result\": true, \"duration\": 103.789, \"__run_num__\": 14, > \"changes\": {\"locale\": \"etcd\"}, \"__id__\": \"etcd\"}, > \"group_|-etcd_|-etcd_|-present\" : > {\"comment\": \"Group etcd is present and up to date\", \"name\": > \"etcd\", \"start_time\": \"13:57:05.446135\", \"result\": true, > \"duration\": 0.478, \"__ run_num__\": > 10, \"changes\": {}, \"__id__\": \"etcd\"}, > \"file_|-etcd_|-/var/lib/etcd_|-directory\": {\"comment\": \"Directory > /var/lib/etcd updated\", \"pch anges\": > {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, \"name\": \"/var/lib/etcd\", > \"start_time\": \"13:57:05.452433\", \"result\": true, \"duration\": > 1.332, \ "__run_num__\": 12, > \"changes\": {\"mode\": \"0700\"}, \"__id__\": \"etcd\"}, > \"file_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": > {\"comment\": \" File > /etc/pki/minion.key exists with proper permissions. No changes made.\", > \"pchanges\": {}, \"name\": \"/etc/pki/minion.key\", \"start_time\": > \"13:57:04.6 75638\", \"result\": true, > \"duration\": 0.806, \"__run_num__\": 7, \"changes\": {}, \"__id__\": > \"/etc/pki/minion.key\"}, \"file_|-/etc/pki/trust/anchors_|-/ > etc/pki/trust/anchors_|-directory\": > {\"comment\": \"Directory /etc/pki/trust/anchors is in the correct > state\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/ > anchors\", \"start_time\": \"13:57:02.841138\", > \"result\": true, \"duration\": 0.957, \"__run_num__\": 3, \"changes\": > {}, \"__id__\": \"/etc/pki/trust/ancho > rs\"}, \"file_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-managed\": > {\"comment\": \"File /etc/pki/minion.crt exists with proper permissions. > No changes mad e.\", \"pchanges\": {}, > \"name\": \"/etc/pki/minion.crt\", \"start_time\": \"13:57:05.443918\", > \"result\": true, \"duration\": 0.834, \"__run_num__\": 9, \"c > hanges\": {}, \"__id__\": > \"/etc/pki/minion.crt\"}, > \"x509_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed > \": {\"comment\": \"File > /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt updated\", \"pchanges\": {}, > \"name\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start > _time\": \"13:57:02.865531\", \"result\": true, > \"duration\": 3.272, \"__run_num__\": 4, \"changes\": {\"diff\": \"New > file\"}, \"__id__\": \"/etc/pki/trust/a > nchors/SUSE_CaaSP_CA.crt\"}, > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": > {\"comment\": \"File /etc/zypp/repos. > d/containers.repo updated\", \"pchanges\": {}, \"name\": > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > \"13:56:58.408694\", \"result\": true, \"durat > ion\": 153.355, \"__run_num__\": 0, \"changes\": {\"diff\": \"New > file\", \"mode\": \"0644\"}, \"__id__\": > \"/etc/zypp/repos.d/containers.repo\"}, \"pkg_|-pyt > hon-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": > \"Package python-M2Crypto is already installed\", \"name\": > \"python-M2Crypto\", \"start_time\": \ > "13:57:02.340920\", \"result\": true, \"duration\": 498.795, > \"__run_num__\": 1, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, > \"pkg_|-etcd_|-etcd_|-inst alled\": > {\"comment\": \"All specified packages are already installed\", > \"name\": \"etcd\", \"start_time\": \"13:57:05.454362\", \"result\": > true, \"duration \": 13.399, > \"__run_num__\": 13, \"changes\": {}, \"__id__\": \"etcd\"}, > \"file_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-/etc/systemd/system/etcd.serv > ice.d/etcd.conf_|-managed\": > {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf > updated\", \"pchanges\": {}, \"name\": \"/etc/systemd/system/et > cd.service.d/etcd.conf\", \"start_time\": > \"13:57:07.212834\", \"result\": true, \"duration\": 71.567, > \"__run_num__\": 18, \"changes\": {\"diff\": \"New file > \", \"mode\": \"0644\"}, \"__id__\": > \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, > \"file_|-/etc/sysconfig/etcd_|-/etc/sysconfig/etcd_|-managed\": {\"com > ment\": \"File /etc/sysconfig/etcd > updated\", \"pchanges\": {}, \"name\": \"/etc/sysconfig/etcd\", > \"start_time\": \"13:57:05.605471\", \"result\": true, \"du > ration\": 83.655, \"__run_num__\": 15, \"changes\": > {\"diff\": \"--- \\n+++ \\n@@ -1,47 +1,30 @@\\n-# > [member]\\n-ETCD_NAME=default\\n-ETCD_DATA_DIR=\\\"/var/ > > lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n-#ETCD_ELECTION_TIMEOUT=\\ > > \"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380\\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\"http://localhost:2379\\\"\\n-#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\ > > n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"http://localhost:2380\\\"\\n-# > if you use differ ent ETCD_NAME (e.g. > test), set ETCD_INITIAL_CLUSTER value for this name, i.e. > \\\"test=http://...\\\"\\n-#ETCD_INITIAL_CLUSTER=\\\"default=http://localhost:23 > > 80\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ADVERTISE_CLIENT_URLS=\\\"http://localhost:2379\ > > \\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\\\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-#ETCD_DISCOVERY_PROXY=\\\"\\\"\\n-#\\n-#[proxy]\\ > > n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\\n-#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n-# > > ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FILE=\\\"\\\"\\n-#ETCD_KEY_FILE=\\\"\\\"\\n-#ETC > > D_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER_KEY_FILE=\\\"\\\"\\n-#ETCD_PEER_CLIENT_CERT_ > > AUTH=\\\"false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n-#\\n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# > examples for -log-package-levels etcdserver=WAR > NING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_LEVELS=\\\"\\\"\\n+# > etcd proxy configuration\\n+# see > https://coreos.com/etcd/docs/latest/op-guide/configuration.htm > > l\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\"null-0050568c7c69.pfizer.com > \\\"\\n+\\n+ETCD_LISTEN_CLIENT_URLS=\\\"http://0.0.0.0:2379\\\"\\n+ > > ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380\\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\"http://null-0050568c7c69.pfizer.com:2379,http://10.34.246.88:2379\\\" > > \\n+\\n+ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/pki/minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minion.key\\n+ETCD_TRUSTED_CA_FI > > LE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FILE=/etc/pki/minion.crt\\n+ET > > CD_PEER_KEY_FILE=/etc/pki/minion.key\\n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# > ETCD_PEER_CLIENT_CERT_AUTH=on\\n+# ETCD_PEER_A > UTO_TLS=on\\n+\\n+# > discovery\\n+ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DISCOVERY_FALLBACK=\\\"proxy\\ > > \"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"https://null-0050568c7c69.pfizer.com:2380,https://10.34.246.88:2380\\ > > \"\\n+ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n\", \"group\": \"etcd\", > \"user\": \"etcd\"}, \"__id__\": \"/etc/sysconfig/etcd\"}, > \"x509_|-/etc/pki/minion.cr > t_|-/etc/pki/minion.crt_|-certificate_managed\": {\"comment\": > \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, \"name\": > \"/etc/pki/minion.crt\", \"st > art_time\": \"13:57:04.676856\", \"result\": true, \"duration\": > 766.905, \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": > {\"Not After\": \"2017- 07-27 > 13:57:05\", \"X509v3 Extensions\": {\"subjectKeyIdentifier\": > \"15:A9:34:9A:0C:C6:72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", > \"keyUsage\": \"critical Key > Encipherment\", \"authorityKeyIdentifier\": > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > Riv > er/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > ", > \"basicConstraints\": \"critical CA:FAL > SE\"}, \"Subject Hash\": \"0F:F8:79:4C\", \"MD5 Finger Print\": > \"72:69:54:30:5F:7D:BD:F7:6B:14:8C:6B:90:DD:8D:D2\", \"SHA1 Finger > Print\": \"1F:2B:E1:94:FA:E > F:F4:4C:43:D1:5B:E9:8C:2D:5C:3F:46:99:70:DD\", \"SHA-256 Finger > Print\": > \"D2:F8:80:38:D9:D5:1C:C0:EC:9A:3E:5A:34:C2:F8:22:36:E5:DB:C0:F3:E8:E3:7A:1D:60:96:5F > :FD:23:FD:5E\", \"Serial Number\": > \"25:B5:7F:89:5A:2F:2E:B1\", \"Version\": 3, \"Key Size\": 4096, > \"Public Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgk > > qhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48\\nAI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRn > > qt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2feylf > > JgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQh\\nU5/iJ26dyyEDwnbz > > 6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/\\n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\neNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+R > > na6PwkxXJP8nXt8NM3yH1Hi8\\n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n-----END > PUBLIC KEY-----\\n\" , \"Subject\": > {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > \"null-0050568c7c69.pfizer.com \", > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddr > ess\": \"hari.mahadevan at pfizer.com > \", \"GN\": \"None\", \"surname\": > \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > Before\": \"2017-04-1 8 13:57:05\", > \"Issuer\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > \"emailAddress\": > \"hari.mahadevan at pfizer.com \", > \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": > \"/etc/pki/minion.crt does not exist.\"}}, \"__id__\": \" > /etc/pki/minion.crt\"}, > \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory > /etc/pki is in the correct state\", \"pchanges\": {}, \"name\": > \"/etc/pki\", \"start_time\": > \"13:57:02.839911\", \"result\": true, \"duration\": 1.089, > \"__run_num__\": 2, \"changes\": {}, \"__id__\": \"/etc/pki\"}, \"cm > d_|-etcd_|-rm -rf /var/lib/etcd/*_|-run\": > {\"comment\": \"Command \\\"rm -rf /var/lib/etcd/*\\\" run\", \"name\": > \"rm -rf /var/lib/etcd/*\", \"start_time\": > \"13:57:05.737534\", \"result\": true, \"duration\": 8.905, > \"__run_num__\": 16, \"changes\": {\"pid\": 3150, \"retcode\": 0, > \"stderr\": \"\", \"stdout\": \ "\"}, > \"__id__\": \"etcd\"}, \"service_|-etcd_|-etcd_|-running\": > {\"comment\": \"Service etcd has been enabled, and is running\", > \"name\": \"etcd\", \"start _time\": > \"13:57:05.747520\", \"__id__\": \"etcd\", \"duration\": 1465.078, > \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"result\": true}, > \"x509_|-/e > tc/pki/minion.key_|-/etc/pki/minion.key_|-private_key_managed\": > {\"comment\": \"File /etc/pki/minion.key updated\", \"pchanges\": {}, > \"name\": \"/etc/pki/mi nion.key\", > \"start_time\": \"13:57:02.870325\", \"result\": true, \"duration\": > 1805.146, \"__run_num__\": 6, \"changes\": \"New private key > generated\", \"_ _id__\": > \"/etc/pki/minion.key\"}}, \"retcode\": 0, \"success\": true, \"cmd\": > \"_return\", \"_stamp\": \"2017-04-18T13:57:07.292911\", \"fun\": > \"state.sls\ ", \"id\": > \"null-0050568c7c69.pfizer.com \", > \"out\": > \"highstate\"}","alter_time":"2017-04-18T13:57:07.000Z","master_id":"ppklablinux30.localdomain_master"," > > taken_at":"2017-04-18T13:57:11.000Z","processed_at":"2017-04-18T13:57:11.000Z","worker_id":"worker1"},{"id":70,"tag":"20170418135712692212","data":"{\"_stamp\ > ": \"2017-04-18T13:57:12.692634\", > \"minions\": [\"ppklablinux31\", \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:12.000Z","master_id":"p > > pklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z","worker_id":"worker1"},{"id":71,"tag":"salt/j > > ob/20170418135712692212/new","data":"{\"tgt_type\": \"list\", \"jid\": > \"20170418135712692212\", \"tgt\": [\"ppklablinux31\", > \"null-0050568303b8.pfizer.com \" > ], \"_stamp\": > \"2017-04-18T13:57:12.693191\", \"user\": \"root\", \"arg\": > [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\", \"minions\": > [\"ppklab linux31\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:12.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T1 > > 3:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z","worker_id":"worker1"},{"id":72,"tag":"salt/job/20170418135712692212/ret/ppklablinux31","data":"{\"fun > _args\": [\"20170418135657522690\"], > \"jid\": \"20170418135712692212\", \"return\": {\"tgt_type\": > \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": > \"roles:kube-(master|minion)\", \"pid\": 3261, > \"ret\": \"\", \"user\": \"root\", \"arg\": > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": t > rue, \"saltenv\": \"base\", \"__kwarg__\": > true}], \"fun\": \"state.sls\"}, \"retcode\": 0, \"success\": true, > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T > 13:57:12.743983\", \"fun\": \"saltutil.find_job\", \"id\": > \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:12.000Z","master_id":"ppklablinux30.localdomain_ > > master","taken_at":"2017-04-18T13:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z","worker_id":"worker1"},{"id":73,"tag":"20170418135722886110","data":"{ > \"_stamp\": > \"2017-04-18T13:57:22.886424\", \"minions\": [\"ppklablinux31\", > \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:22.000Z","mast > > er_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:26.000Z","processed_at":"2017-04-18T13:57:26.000Z","worker_id":"worker1"},{"id":74,"tag > > ":"salt/job/20170418135722886110/new","data":"{\"tgt_type\": \"list\", > \"jid\": \"20170418135722886110\", \"tgt\": [\"ppklablinux31\", > \"null-0050568303b8.pfi zer.com > \"], \"_stamp\": \"2017-04-18T13:57:22.886820\", > \"user\": \"root\", \"arg\": [\"20170418135657522690\"], \"fun\": > \"saltutil.find_job\", \"minions\": > [\"ppklablinux31\", \"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:22.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"201 > > 7-04-18T13:57:26.000Z","processed_at":"2017-04-18T13:57:26.000Z","worker_id":"worker1"},{"id":75,"tag":"salt/job/20170418135722886110/ret/ppklablinux31","data > ":"{\"fun_args\": > [\"20170418135657522690\"], \"jid\": \"20170418135722886110\", > \"return\": {\"tgt_type\": \"grain_pcre\", \"jid\": > \"20170418135657522690\", \"tgt\": > \"roles:kube-(master|minion)\", \"pid\": 3261, \"ret\": \"\", \"user\": > \"root\", \"arg\": [\"repositories,etcd-proxy\", {\"queue\": false, > \"concur rent\": true, \"saltenv\": > \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\"}, \"retcode\": > 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"20 > 17-04-18T13:57:22.934015\", \"fun\": > \"saltutil.find_job\", \"id\": > \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:22.000Z","master_id":"ppklablinux30.loc > > aldomain_master","taken_at":"2017-04-18T13:57:26.000Z","processed_at":"2017-04-18T13:57:26.000Z","worker_id":"worker1"},{"id":76,"tag":"salt/job/2017041813565 > > 7522690/ret/ppklablinux31","data":"{\"fun_args\": > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, > \"saltenv\": \"base\"}], \"jid\": \"2 > 0170418135657522690\", \"return\": > {\"file_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": > {\"comment\": \" File > /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with proper permissions. > No changes made.\", \"pchanges\": {}, \"name\": > \"/etc/pki/trust/anchors/SUSE_Ca > aSP_CA.crt\", \"start_time\": \"13:56:59.209683\", \"result\": true, > \"duration\": 0.895, \"__run_num__\": 5, \"changes\": {}, \"__id__\": > \"/etc/pki/trust/an > chors/SUSE_CaaSP_CA.crt\"}, \"user_|-etcd_|-etcd_|-present\": > {\"comment\": \"User etcd is present and up to date\", \"name\": > \"etcd\", \"start_time\": \"13: > 57:01.166178\", \"result\": true, \"duration\": 1.237, \"__run_num__\": > 11, \"changes\": {}, \"__id__\": \"etcd\"}, > \"iptables_|-etcd_|-etcd_|-append\": {\"co > mment\": \"Set iptables rule for etcd to: /usr/sbin/iptables --wait > -t filter -A INPUT -p tcp -m state --state NEW -m multiport --dports > 2379,2380,4001 --jum p ACCEPT for > ipv4\", \"name\": \"etcd\", \"start_time\": \"13:57:01.186448\", > \"result\": true, \"duration\": 82.853, \"__run_num__\": 14, > \"changes\": {\"loc ale\": \"etcd\"}, > \"__id__\": \"etcd\"}, \"group_|-etcd_|-etcd_|-present\": {\"comment\": > \"Group etcd is present and up to date\", \"name\": \"etcd\", \"star > t_time\": \"13:57:01.164678\", \"result\": > true, \"duration\": 0.482, \"__run_num__\": 10, \"changes\": {}, > \"__id__\": \"etcd\"}, \"file_|-etcd_|-/var/lib/et > cd_|-directory\": {\"comment\": \"Directory /var/lib/etcd > updated\", \"pchanges\": {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, > \"name\": \"/var/lib/etcd\", \"s > tart_time\": \"13:57:01.167829\", \"result\": true, \"duration\": > 1.373, \"__run_num__\": 12, \"changes\": {\"mode\": \"0700\"}, > \"__id__\": \"etcd\"}, \"file > _|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": {\"comment\": > \"File /etc/pki/minion.key exists with proper permissions. No changes > made.\", \"pchan ges\": {}, \"name\": > \"/etc/pki/minion.key\", \"start_time\": \"13:57:00.377681\", > \"result\": true, \"duration\": 0.889, \"__run_num__\": 7, \"changes\": > {}, \"__id__\": > \"/etc/pki/minion.key\"}, > \"file_|-/etc/pki/trust/anchors_|-/etc/pki/trust/anchors_|-directory\": > {\"comment\": \"Directory /etc/pki/trust/anchor > s is in the correct state\", \"pchanges\": {}, \"name\": > \"/etc/pki/trust/anchors\", \"start_time\": \"13:56:59.203831\", > \"result\": true, \"duration\": 0.98 9, > \"__run_num__\": 3, \"changes\": {}, \"__id__\": > \"/etc/pki/trust/anchors\"}, > \"file_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-managed\": > {\"comment\": \"File > /etc/pki/minion.crt exists with proper permissions. No changes made.\", > \"pchanges\": {}, \"name\": \"/etc/pki/minion.crt\", \"start_time\": > \"13:57:0 1.163388\", \"result\": true, > \"duration\": 0.834, \"__run_num__\": 9, \"changes\": {}, \"__id__\": > \"/etc/pki/minion.crt\"}, \"x509_|-/etc/pki/trust/anchors/ > > SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed\": > {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt updated\", > \"pchan ges\": {}, \"name\": > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > \"13:56:59.205883\", \"result\": true, \"duration\": 3.666, > \"__run_num__\" : 4, \"changes\": > {\"diff\": \"New file\"}, \"__id__\": > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ > repos.d/containers.repo_|-managed\": {\"comment\": > \"File /etc/zypp/repos.d/containers.repo is in the correct state\", > \"pchanges\": {}, \"name\": \"/etc/zypp > /repos.d/containers.repo\", \"start_time\": \"13:56:58.373899\", > \"result\": true, \"duration\": 59.059, \"__run_num__\": 0, \"changes\": > {}, \"__id__\": \"/e > tc/zypp/repos.d/containers.repo\"}, > \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": > \"Package python-M2Crypto is already installed\", \ > "name\": \"python-M2Crypto\", \"start_time\": > \"13:56:58.963258\", \"result\": true, \"duration\": 239.098, > \"__run_num__\": 1, \"changes\": {}, \"__id__\": \ > "python-M2Crypto\"}, \"pkg_|-etcd_|-etcd_|-installed\": > {\"comment\": \"All specified packages are already installed\", > \"name\": \"etcd\", \"start_time\": \" > 13:57:01.169779\", \"result\": true, \"duration\": 13.51, > \"__run_num__\": 13, \"changes\": {}, \"__id__\": \"etcd\"}, > \"file_|-/etc/systemd/system/etcd.servi > ce.d/etcd.conf_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-managed\": > {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf > updated\", \"pcha nges\": {}, \"name\": > \"/etc/systemd/system/etcd.service.d/etcd.conf\", \"start_time\": > \"13:57:31.962373\", \"result\": true, \"duration\": 71.157, \"__run_n > um__\": 18, \"changes\": {\"diff\": \"New > file\", \"mode\": \"0644\"}, \"__id__\": > \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, > \"file_|-/etc/sysconfig/ > etcd_|-/etc/sysconfig/etcd_|-managed\": {\"comment\": \"File > /etc/sysconfig/etcd updated\", \"pchanges\": {}, \"name\": > \"/etc/sysconfig/etcd\", \"start_time\ > ": \"13:57:01.269992\", \"result\": true, \"duration\": 83.05, > \"__run_num__\": 15, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -1,47 > +1,30 @@\\n-# [member]\\n > -ETCD_NAME=default\\n-ETCD_DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_INTE > > RVAL=\\\"100\\\"\\n-#ETCD_ELECTION_TIMEOUT=\\\"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380\\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\"http://localhos > > t:2379\\\"\\n-#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"htt > p://localhost:2380\\\"\\n-# if you use > different ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this > name, i.e. \\\"test=http://...\\\"\\n-#ETCD_IN > > ITIAL_CLUSTER=\\\"default=http://localhost:2380\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ADV > > ERTISE_CLIENT_URLS=\\\"http://localhost:2379\\\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\\\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-#ETC > > D_DISCOVERY_PROXY=\\\"\\\"\\n-#\\n-#[proxy]\\n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\ > > \n-#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n-#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FIL > > E=\\\"\\\"\\n-#ETCD_KEY_FILE=\\\"\\\"\\n-#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER > > _KEY_FILE=\\\"\\\"\\n-#ETCD_PEER_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n-#\\n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# > ex amples for -log-package-levels > etcdserver=WARNING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_LEVELS=\\\"\\\"\\n+# > etcd proxy configuration\\n+# see https://coreos.co > > m/etcd/docs/latest/op-guide/configuration.html\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\"ppklablinux31\\\"\\n+\\n+ETCD_LISTEN_CLIENT_URLS=\ > > \\"http://0.0.0.0:2379\\\"\\n+ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380\\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\"http://ppklablinux31.localdomain:2379,h > ttp://10.34.246.31:2379 > \\\"\\n+\\n+ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/pki/minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minio > > n.key\\n+ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FIL > > E=/etc/pki/minion.crt\\n+ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# > ETCD_PEER_CLIENT_CE RT_AUTH=on\\n+# > ETCD_PEER_AUTO_TLS=on\\n+\\n+# > discovery\\n+ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DIS > > COVERY_FALLBACK=\\\"proxy\\\"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"https://ppklablinux31.localdomain:2380,htt > ps://10.34.246.31:2380 > \\\"\\n+ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n\", > \"group\": \"etcd\", \"user\": \"etcd\"}, \"__id__\": > \"/etc/sysconfig/etcd\"}, \"x > 509_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-certificate_managed\": {\"comment\": > \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, \"name\": \"/et > c/pki/minion.crt\", \"start_time\": > \"13:57:00.378988\", \"result\": true, \"duration\": 784.241, > \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": > {\"Not After\": \"2017-07-27 13:57:00\", \"X509v3 > Extensions\": {\"subjectKeyIdentifier\": > \"FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\", \ > "keyUsage\": \"critical Key Encipherment\", > \"authorityKeyIdentifier\": > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN > =localdomain/L=Pearl > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > ", > \"basicConstrai nts\": \"critical > CA:FALSE\"}, \"Subject Hash\": \"03:5E:85:4C\", \"MD5 Finger Print\": > \"60:B2:03:54:A9:98:50:F6:67:52:DB:CA:EC:99:9E:12\", \"SHA1 Finger Pri > nt\": > \"72:E8:0C:33:2D:49:BB:10:A5:53:6B:17:DC:15:1B:E6:BA:FB:7C:FE\", > \"SHA-256 Finger Print\": > \"A0:CD:51:FE:5C:8E:F0:B2:AD:40:82:AC:75:0B:85:77:AC:15:E1:76 > :20:24:22:2B:01:D9:5D:B3:9F:8D:C3:00\", \"Serial > Number\": \"CB:E0:DD:92:DC:7E:F6:F2\", \"Version\": 3, \"Key Size\": > 4096, \"Public Key\": \"-----BEGIN PUBLI > C > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBE\\nuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1k\\nqPU5zMjmeE0 > > UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\nStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu\\n7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp > > 0u9+CNpZ2Vc6kHWOk0NUXnrka8KQS\\npYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\nXqDAVDCcL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/ > > fcACG\\nIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\nXp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/\\nK/eOWw8LeFK2SQT9 > > eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2\\nTt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n----- > END PUBLIC KEY-----\\n\", \"Subject\": > {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > \"ppklablinux31.localdomain\", \"SP\": \"NY\", \"L\": \"Pearl > River\", \"emailAddress\": > \"hari.mahadevan at pfizer.com \", > \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer > Hash\": \"2F:0B:83:D6\", \"Not > Before\": \"2017-04-18 13:57:00\", \"Issuer\": {\"C\": \"US\", > \"organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": > \"NY\", \"L\": \"Pearl River \", > \"emailAddress\": \"hari.mahadevan at pfizer.com > \", \"GN\": \"None\", \"surname\": > \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/minion.crt does not > exist .\"}}, \"__id__\": > \"/etc/pki/minion.crt\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": > {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchan > ges\": {}, \"name\": \"/etc/pki\", > \"start_time\": \"13:56:59.202569\", \"result\": true, \"duration\": > 1.123, \"__run_num__\": 2, \"changes\": {}, \"__id__\" > : \"/etc/pki\"}, \"cmd_|-etcd_|-rm -rf > /var/lib/etcd/*_|-run\": {\"comment\": \"Command \\\"rm -rf > /var/lib/etcd/*\\\" run\", \"name\": \"rm -rf /var/lib/etcd > /*\", \"start_time\": \"13:57:01.391652\", > \"result\": true, \"duration\": 8.113, \"__run_num__\": 16, \"changes\": > {\"pid\": 3293, \"retcode\": 0, \"stderr\" > : \"\", \"stdout\": \"\"}, \"__id__\": \"etcd\"}, > \"service_|-etcd_|-etcd_|-running\": {\"comment\": \"Service etcd has > been enabled, and is dead\", \"name\": > \"etcd\", \"start_time\": \"13:57:01.400864\", \"__id__\": \"etcd\", > \"duration\": 30561.242, \"__run_num__\": 17, \"changes\": {\"etcd\": > true}, \"result\": false}, > \"x509_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-private_key_managed\": > {\"comment\": \"File /etc/pki/minion.key updated\", \"pchanges\": {}, > \"n ame\": \"/etc/pki/minion.key\", > \"start_time\": \"13:56:59.211237\", \"result\": true, \"duration\": > 1166.283, \"__run_num__\": 6, \"changes\": \"New private > key generated\", \"__id__\": > \"/etc/pki/minion.key\"}}, \"retcode\": 2, \"success\": true, \"cmd\": > \"_return\", \"_stamp\": \"2017-04-18T13:57:32.044625\", \ > "fun\": \"state.sls\", \"id\": \"ppklablinux31\", > \"out\": > \"highstate\"}","alter_time":"2017-04-18T13:57:32.000Z","master_id":"ppklablinux30.localdomain_mast > > er","taken_at":"2017-04-18T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","worker_id":"worker1"},{"id":77,"tag":"service.running","data":"{\"comment > \": \"Service etcd has been enabled, > and is dead\", \"_stamp\": \"2017-04-18T13:57:32.045629\", \"retcode\": > 2, \"result\": false, \"start_time\": \"13:57:01. > 400864\", \"__id__\": \"etcd\", \"duration\": 30561.242, > \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"name\": > \"etcd\"}","alter_time":"2017-04-18T13: > 57:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","worker_id":"worker > > 1"},{"id":78,"tag":"20170418135732909927","data":"{\"_stamp\": > \"2017-04-18T13:57:32.910393\", \"minions\": > [\"null-0050568303b8.pfizer.com > \"]}","alter_time": > > "2017-04-18T13:57:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","wor > > ker_id":"worker1"},{"id":79,"tag":"salt/job/20170418135732909927/new","data":"{\"tgt_type\": > \"list\", \"jid\": \"20170418135732909927\", \"tgt\": [\"null-005 > 0568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:57:32.910923\", \"user\": \"root\", \"arg\": > [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\", > \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:32.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-1 > > 8T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z","worker_id":"worker1"},{"id":80,"tag":"20170418135743253639","data":"{\"_stamp\": > \"2017-04-18T13:5 7:43.253949\", > \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:43.000Z","master_id":"ppklablinux30.localdomain_master","taken > > _at":"2017-04-18T13:57:47.000Z","processed_at":"2017-04-18T13:57:47.000Z","worker_id":"worker1"},{"id":81,"tag":"salt/job/20170418135743253639/new","data":"{\ > "tgt_type\": \"grain\", \"jid\": > \"20170418135743253639\", \"tgt\": \"roles:nfs\", \"_stamp\": > \"2017-04-18T13:57:43.254335\", \"user\": \"root\", \"arg\": [{ > \"queue\": false, \"concurrent\": false, > \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": > \"state.highstate\", \"minions\": [\"null-0050568303b8.pfizer. > > com\"]}","alter_time":"2017-04-18T13:57:43.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:47.000Z","processed_at":"2017-04- > > 18T13:57:47.000Z","worker_id":"worker1"},{"id":82,"tag":"20170418135748355712","data":"{\"_stamp\": > \"2017-04-18T13:57:48.356190\", \"minions\": [\"null-00505 > 68303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:48.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:52.000Z","processe > > d_at":"2017-04-18T13:57:52.000Z","worker_id":"worker1"},{"id":83,"tag":"salt/job/20170418135748355712/new","data":"{\"tgt_type\": > \"list\", \"jid\": \"2017041 > 8135748355712\", \"tgt\": [\"null-0050568303b8.pfizer.com > \"], \"_stamp\": > \"2017-04-18T13:57:48.356761\", \"user\": \"root\", \"arg\": > [\"20170418135743253639 \"], \"fun\": > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > \"]}","alter_time":"2017-04-18T13:57:48.000Z","master_id":"ppklablinux30.loca > > ldomain_master","taken_at":"2017-04-18T13:57:52.000Z","processed_at":"2017-04-18T13:57:52.000Z","worker_id":"worker1"},{"id":84,"tag":"salt/run/20170418135525 > 317500/ret","data":"{\"fun_args\": > [{\"mods\": \"orch.kubernetes\"}], \"jid\": \"20170418135525317500\", > \"return\": {\"outputter\": \"highstate\", \"data\": > {\"ppklablinux30.localdomain_master\": > {\"salt_|-reboot_setup_|-reboot_setup_|-state\": {\"comment\": \"One or > more requisite failed: orch.kubernetes.etcd_pro > xy_setup\", \"__run_num__\": 10, \"__sls__\": > \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > \"salt_|-ca_setup_|-ca_setup_|-state\": {\"comment\": > \"States ran successfully. Updating ca.\", \"name\": > \"ca_setup\", \"start_time\": \"13:56:01.361247\", \"result\": true, > \"duration\": 25460.346, \"__run_num > __\": 2, \"__jid__\": \"20170418135601489588\", \"changes\": {\"ret\": > {\"ca\": > {\"file_|-/etc/pki/issued_certs_|-/etc/pki/issued_certs_|-directory\": > {\"comm ent\": \"Directory > /etc/pki/issued_certs updated\", \"pchanges\": > {\"/etc/pki/issued_certs\": {\"directory\": \"new\"}}, \"name\": > \"/etc/pki/issued_certs\", > \"start_time\": \"13:56:07.194634\", \"result\": true, \"duration\": > 1.281, \"__run_num__\": 6, \"changes\": {\"/etc/pki/issued_certs\": > \"New Dir\"}, \"__id_ _\": > \"/etc/pki/issued_certs\"}, \"group_|-kube_group_|-kube_|-present\": > {\"comment\": \"New group kube created\", \"name\": \"kube\", > \"start_time\": \"13:5 6:03.585602\", > \"result\": true, \"duration\": 492.98, \"__run_num__\": 2, \"changes\": > {\"passwd\": \"x\", \"gid\": 492, \"name\": \"kube\", \"members\": []} > , \"__id__\": \"kube_group\"}, > \"module_|-mine.send_|-mine.send_|-run\": {\"comment\": \"Module > function mine.send executed\", \"name\": \"mine.send\", \"star > t_time\": \"13:56:08.526443\", \"result\": true, > \"duration\": 522.106, \"__run_num__\": 11, \"changes\": {\"ret\": > true}, \"__id__\": \"mine.send\"}, \"file_ > |-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-managed\": {\"comment\": \"File > /etc/pki/ca.crt exists with proper permissions. No changes made.\", > \"pchanges\": {}, \" name\": > \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.521611\", \"result\": > true, \"duration\": 0.817, \"__run_num__\": 10, \"changes\": {}, > \"__id__\": \"/ etc/pki/ca.crt\"}, > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": > {\"comment\": \"File /etc/zypp/repos.d/containe > rs.repo updated\", \"pchanges\": {}, \"name\": > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > \"13:56:03.255349\", \"result\": true, \"duration\": 162 > .91, \"__run_num__\": 0, \"changes\": {\"diff\": \"New > file\", \"mode\": \"0644\"}, \"__id__\": > \"/etc/zypp/repos.d/containers.repo\"}, \"file_|-/etc/pki_|-/e > tc/pki_|-directory\": {\"comment\": \"Directory > /etc/pki is in the correct state\", \"pchanges\": {}, \"name\": > \"/etc/pki\", \"start_time\": \"13:56:07.19341 > 4\", \"result\": true, \"duration\": 1.082, \"__run_num__\": 5, > \"changes\": {}, \"__id__\": \"/etc/pki\"}, > \"x509_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-certi > ficate_managed\": {\"comment\": \"File /etc/pki/ca.crt > updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.crt\", > \"start_time\": \"13:56:08.483311\", \"resu > lt\": true, \"duration\": 38.149, \"__run_num__\": 9, \"changes\": > {\"Certificate\": {\"New\": {\"Not After\": \"2027-04-16 13:56:08\", > \"SHA-256 Finger Print \": > \"BF:C2:6C:31:46:B9:50:13:A2:E7:AD:BF:54:5E:FB:E5:C2:4C:E1:38:5A:0A:80:BC:AD:FC:79:92:24:E8:A8:97\", > \"Subject Hash\": \"2F:0B:83:D6\", \"Serial Number\": > \"F1:3D:64:29:EA:09:37:80\", \"SHA1 Finger Print\": > \"20:2A:25:0D:0B:2F:91:E8:3F:92:F3:2B:7F:8A:C5:37:F1:1E:15:09\", > \"X509v3 Extensions\": {\"subjectKeyIden > tifier\": > \"51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\", > \"keyUsage\": \"critical Certificate Sign, CRL Sign\", > \"authorityKeyIdentifier\": > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=ha > > ri.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > ", > \"basicConstraints\": \"critical CA:TRUE\"}, \"MD5 Finger Print\": > \"A5:99:B1:1C:A3:48: > E9:64:86:35:24:7F:41:1F:00:90\", \"Version\": 3, \"Key Size\": 4096, > \"Public Key\": \"-----BEGIN PUBLIC > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAg > > EAzZD6PArP1r2y1UIXB43n\\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ > > ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK > > 4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S > > 4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN > > 792kR823ed734CmUvl3hEeAlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END > PUBLIC KEY-----\\n\", \"Issuer\": {\"C\": \"US\", \ > "organizationName\": \"Pfizer\", \"CN\": \"localdomain\", > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > \"hari.mahadevan at pfizer.com \", > \"GN\": \"N one\", \"surname\": > \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > Before\": \"2017-04-18 13:56:08\", \"Subject\": {\"C\": \"US\", \"orga > nizationName\": \"Pfizer\", \"CN\": > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > \"emailAddress\": \"hari.mahadevan at pfizer.com > \", \"GN\": \"None\" > , \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": > \"/etc/pki/ca.crt does not exist.\"}}, \"__id__\": \"/etc/pki/ca.crt\"}, > \"pkg_|-python-M2Crypto_|-python > -M2Crypto_|-installed\": {\"comment\": \"Package python-M2Crypto is > already installed\", \"name\": \"python-M2Crypto\", \"start_time\": > \"13:56:06.872964\", \ "result\": true, > \"duration\": 320.254, \"__run_num__\": 4, \"changes\": {}, \"__id__\": > \"python-M2Crypto\"}, \"x509_|-/etc/pki/ca.key_|-/etc/pki/ca.key_|-pr > ivate_key_managed\": {\"comment\": \"File > /etc/pki/ca.key updated\", \"pchanges\": {}, \"name\": > \"/etc/pki/ca.key\", \"start_time\": \"13:56:07.198826\", \"r > esult\": true, \"duration\": 1282.75, > \"__run_num__\": 7, \"changes\": \"New private key generated\", > \"__id__\": \"/etc/pki/ca.key\"}, \"file_|-/etc/pki/ca.k > ey_|-/etc/pki/ca.key_|-managed\": {\"comment\": \"\", > \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", \"start_time\": > \"13:56:08.481733\", \"result\": true, > \"duration\": 1.035, \"__run_num__\": 8, \"changes\": {\"mode\": > \"0600\"}, \"__id__\": \"/etc/pki/ca.key\"}, > \"user_|-kube_user_|-kube_|-present\": {\"commen > t\": \"New user kube created\", \"name\": \"kube\", > \"start_time\": \"13:56:04.094251\", \"result\": true, \"duration\": > 602.999, \"__run_num__\": 3, \"change > s\": {\"shell\": \"/bin/bash\", \"workphone\": \"\", \"uid\": 1000, > \"passwd\": \"x\", \"roomnumber\": \"\", \"gid\": 100, \"groups\": > [\"kube\", \"users\"], \"home\": \"\", > \"fullname\": \"\", \"homephone\": \"\", \"name\": \"kube\"}, > \"__id__\": \"kube_user\"}, \"file_|-/etc/motd_|-/etc/motd_|-managed\": > {\"comme nt\": \"File /etc/motd > updated\", \"pchanges\": {}, \"name\": \"/etc/motd\", \"start_time\": > \"13:56:03.418415\", \"result\": true, \"duration\": 145.221, \"_ > _run_num__\": 1, \"changes\": {\"diff\": > \"--- \\n+++ \\n@@ -0,0 +1,3 @@\\n+Welcome to > ppklablinux30.localdomain.\\n+The roles of this node are:\\n+ - ca\\n\ > "}, \"__id__\": \"/etc/motd\"}}}, > \"out\": \"highstate\"}, \"__id__\": \"ca_setup\"}, > \"salt_|-kube_master_setup_|-kube_master_setup_|-state\": {\"comment\": > \"One or more requisite failed: > orch.kubernetes.etcd_proxy_setup\", \"__run_num__\": 6, \"__sls__\": > \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > > \"salt_|-etcd_proxy_setup_|-etcd_proxy_setup_|-state\": {\"comment\": > \"Run failed on minions: ppklablinux31\\nFailures:\\n > ppklablinux31:\\n --------- -\\n > ID: /etc/zypp/repos.d/containers.repo\\n Function: > file.managed\\n Result: True\\n Comment: File > /etc/zypp/repos.d/c ontainers.repo is > in the correct state\\n Started: 13:56:58.373899\\n > Duration: 59.059 ms\\n Changes: \\n ----------\\n > ID: python-M2Crypto\\n > Function: pkg.installed\\n Result: True\\n Comment: > Package python-M2Crypto is already installed\\n > Started: 13:56:58.963258\\n Duration: 239.098 > ms\\n Changes: \\n ----------\\n ID: > /etc/pki\\n Function: file.director > y\\n Result: True\\n Comment: Directory /etc/pki is > in the correct state\\n Started: 13:56:59.202569\\n > Duration: 1.123 ms\\n > Changes: \\n ----------\\n ID: > /etc/pki/trust/anchors\\n Function: file.directory\\n > Result: True\\n Comment : > Directory /etc/pki/trust/anchors is in the correct state\\n > Started: 13:56:59.203831\\n Duration: 0.989 ms\\n > Changes: \\n ----- -----\\n > ID: /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n Function: > x509.pem_managed\\n Result: True\\n Comment: File /etc > /pki/trust/anchors/SUSE_CaaSP_CA.crt > updated\\n Started: 13:56:59.205883\\n Duration: 3.666 > ms\\n Changes: \\n ----- > -----\\n diff:\\n New > file\\n ----------\\n ID: > /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n Funct > ion: file.managed\\n Result: True\\n > Comment: File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with > proper permissions. No changes made.\ > \n Started: 13:56:59.209683\\n Duration: 0.895 ms\\n > Changes: \\n ----------\\n ID: > /etc/pki/minion.key\\n Fun > ction: x509.private_key_managed\\n Result: True\\n > Comment: File /etc/pki/minion.key updated\\n Started: > 13:56:59.211237\\n Du ration: > 1166.283 ms\\n Changes: Invalid Changes data: New private key > generated\\n ----------\\n ID: /etc/pki/minion.key\\n > F unction: file.managed\\n > Result: True\\n Comment: File /etc/pki/minion.key exists with > proper permissions. No changes made.\\n Starte > d: 13:57:00.377681\\n Duration: 0.889 ms\\n > Changes: \\n ----------\\n ID: > /etc/pki/minion.crt\\n Function: x509.certi > ficate_managed\\n Result: True\\n Comment: > File /etc/pki/minion.crt updated\\n Started: 13:57:00.378988\\n > Duration: 784.241 m s\\n > Changes: \\n ----------\\n > Certificate:\\n ----------\\n > New:\\n > ----------\\n Issuer:\\n > ----------\\n C:\\n > US\\n > CN:\\n localdomain\\n > GN:\\n > None\\n L:\\n > Pearl River\\n > OU:\\n > BTI\\n SP:\\n > NY\\n emailAddress:\\n > > hari.mahadevan at pfizer.com \\n > organizationName:\\n > Pfizer\\n > surname:\\n None\\n > Issuer Hash:\\n 2F:0B:83:D > 6\\n Key Size:\\n > 4096\\n MD5 Finger > Print:\\n 60: > B2:03:54:A9:98:50:F6:67:52:DB:CA:EC:99:9E:12\\n > Not After:\\n 2017-07-27 13:57:00\\n > Not Before:\\n > 2017-04-18 13:57:00\\n > Public Key:\\n -----BEGIN PUBLI > C KEY-----\\n > MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBE\\n > uXGuonX5+UGXOCHk0q > j8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1k\\n > > qPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\n > > StCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu\\n > 7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ > 2Vc6kHWOk0NUXnrka8KQS\\n > > pYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\n > XqDAVDC > cL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACG\\n > > IICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\n > > Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/\\n > K/eOWw8LeFK2SQT9eIt1neNIkZTlO3Lu > UPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n > > /FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2\\n > > Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n > -----END PUBLIC KEY-----\\n SHA-256 Finger > Print:\\n > A0:CD:51:FE:5C:8E:F0:B2:AD:40:82:AC:75:0B:85:77:AC:15:E1:76:20:24:22:2B:01:D9:5D:B3:9F:8D:C3:00\\n > SHA1 Finger Prin > t:\\n > 72:E8:0C:33:2D:49:BB:10:A5:53:6B:17:DC:15:1B:E6:BA:FB:7C:FE\\n > Serial Number:\\n > CB:E0:DD:92:DC:7E:F6:F2\\n > Subject:\\n ----------\\n > C:\\n > US\\n CN:\\n > ppklablinux31.localdomain\\n > GN:\\n > None\\n L:\\n > Pearl River\\n > OU:\\n BTI\\n > SP:\\n NY\\n > e > mailAddress:\\n > hari.mahadevan at pfizer.com \\n > organizationName:\\n > Pfizer\\n > surname:\\n None\\n > Subject Hash:\\n > 03:5E:85:4C\\n Version:\\n > 3\\n X509v3 > Extensions:\\n > ----------\\n > authorityKeyIdentifier:\\n > keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:5 > 1:47:45:3F:4D:9F:5C:99\\n > DirName:/C=US/CN=localdomain/L=Pearl > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.mahadeva > n at pfizer.com/SN=None\\n > > serial:F1:3D:64:29:EA:09:37:80\\n > basicConstraints:\\n > critical CA:FALSE\\n > keyUsage:\\n critical Key > Encipherment\\n > subjectKeyIdentifier:\\n > FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\\n > Old: \\n > /etc/pki/minion.crt does not exist.\\n ----------\\n > ID: /etc/pki/minion.crt\\n Function: file.managed\\n > Result: True\\n Comment: File > /etc/pki/minion.crt exists with proper permissions. No changes made.\\n > Started: 13:57:01.163388\\n > Duration: 0.834 ms\\n Changes: \\n ----------\\n > ID: etcd\\n Function: group.present\\n Result: > True\\n Comment: Group etcd is > present and up to date\\n Started: 13:57:01.164678\\n > Duration: 0.482 ms\\n Changes: \\n ----------\\n > ID: etcd\\n Function: > user.present\\n Result: True\\n Comment: User etcd is > present and up to date\\n Started: 13:57: > 01.166178\\n Duration: 1.237 ms\\n Changes: > \\n ----------\\n ID: etcd\\n Function: > file.directory\\n Name: > /var/lib/etcd\\n Result: True\\n Comment: Directory > /var/lib/etcd updated\\n Started: 13:57:01.167829\\n > Duration: 1.373 ms\\ n > Changes: \\n ----------\\n mode:\\n > 0700\\n ----------\\n ID: etcd\\n > Function: pkg.installed\\n > Result: True\\n Comment: All specified packages are already > installed\\n Started: 13:57:01.169779\\n > Duration: 13.51 ms\\n Changes: \\n > ----------\\n ID: etcd\\n Function: > iptables.append\\n Result: True\\n > Comment: Set iptables rule for etcd to: /usr/sbin/iptables > --wait -t filter -A INPUT -p tcp -m state --state NEW -m multiport > --dports 2379,2380,4001 --jum p ACCEPT > for ipv4\\n Started: 13:57:01.186448\\n Duration: 82.853 > ms\\n Changes: \\n ----------\\n > locale:\\n > etcd\\n ----------\\n ID: /etc/sysconfig/etcd\\n > Function: file.managed\\n Result: True\\n > Comment: File /etc/sysconfig/etcd updated\\n > Started: 13:57:01.269992\\n Duration: 83.05 ms\\n > Changes: \\n --- > -------\\n diff:\\n --- \\n > +++ \\n @@ -1,47 +1,30 @@\\n > -# [member]\\n > -ETCD_NAME=default\\n > -ETCD_DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n > -#ETC D_WAL_DIR=\\\"\\\"\\n > -#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n > -#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n > -#ETCD_ELECTION_TIMEOUT=\\\"1000\\\"\\n > -#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380\\\"\\n > -ETCD_LISTEN > _CLIENT_URLS=\\\"http://localhost:2379\\\"\\n > -#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\n > -#ETCD_MAX_WALS=\\\"5\\\"\\n > -#ETCD_CORS=\\\"\\\"\\n -#\\n > -#[cluster]\\n > -#ETCD_INITIAL_ADVERTISE_PEER_URLS=\ > \\"http://localhost:2380\\\"\\n -# if you use > different ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this > name, i.e. \\\"tes t=http://...\\\"\\n > > -#ETCD_INITIAL_CLUSTER=\\\"default=http://localhost:2380\\\"\\n > -#ETCD_INITIAL_CLUSTER_STATE=\\\ > "new\\\"\\n > -#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n > -ETCD_ADVERTISE_CLIENT_URLS=\\\"http://localhost:23 > 79\\\"\\n > -#ETCD_DISCOVERY=\\\"\\\"\\n > -#ETCD_DISCOVERY_SRV=\\\"\\\"\\n > -#ETCD_DISCOVERY_FALLBA > CK=\\\"proxy\\\"\\n > -#ETCD_DISCOVERY_PROXY=\\\"\\\"\\n -#\\n > -#[proxy]\\n > -#ETCD_PROXY=\\\"off\\\"\\n > -#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n > -#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\\n > -#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n > -#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n > -#ETCD_PR > OXY_READ_TIMEOUT=\\\"0\\\"\\n -#\\n > -#[security]\\n -#ETCD_CERT_FILE=\\\"\\\"\\n > > -#ETCD_KEY_FILE=\\\"\\\"\\n > -#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n > -#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n > -#ETCD_PEER_CERT_FILE=\\\"\\\"\\n > -#ETCD_PEER_KEY_FILE=\\\"\\\"\\n > -#ETCD_PEER_CLIENT_CERT_AUTH=\\\" > false\\\"\\n > -#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n -#\\n > -#[logging]\\n > -#ETCD_DEBUG=\\\"false\\\"\\n -# > examples for -log-package-levels etcdserver=WARNING,security=DEBUG\\n > -#ETCD_LOG_PA > CKAGE_LEVELS=\\\"\\\"\\n +# etcd proxy > configuration\\n +# see > https://coreos.com/etcd/docs/latest/op-guide/configur > ation.html\\n +\\n > +ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n > +ETCD_NAME=\\\"ppklablinux31\\\"\\n > +\\n > +ETCD_LISTEN_CLIENT_URLS=\\\"http://0.0.0.0:2379\\\"\\n > +ETCD_LISTEN_PEER_URLS=\\\"https: > //0.0.0.0:2380 \\\"\\n +\\n > > +ETCD_ADVERTISE_CLIENT_URLS=\\\"http://ppklablinux31.localdomain:2379,http://10.34.246.31 > :2379\\\"\\n +\\n > > +ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n > +ETCD_CERT_FILE=/et > c/pki/minion.crt\\n > +ETCD_KEY_FILE=/etc/pki/minion.key\\n > +ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA > .crt\\n +\\n > +ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n > +ETCD_PEER_CERT_FIL > E=/etc/pki/minion.crt\\n > +ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\n > +ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchor > s/SUSE_CaaSP_CA.crt\\n +# > ETCD_PEER_CLIENT_CERT_AUTH=on\\n +# > ETCD_PEER_AUTO_TLS=on\\n +\\n > +# discovery\\n > +ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n > > +ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n +\\n > +ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n > > +ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"https://ppklablinux31.localdomain:2380,https://10.34.246.31:2380\\\"\\n > +ETCD_INITIAL_CLUSTER_S > TATE=\\\"new\\\"\\n group:\\n > etcd\\n user:\\n etcd\\n > ----------\\n ID: > etcd\\n Function: cmd.run\\n Name: rm -rf > /var/lib/etcd/*\\n Result: True\\n Comment: Command > \\\"rm -rf /var/lib/et cd/*\\\" run\\n > Started: 13:57:01.391652\\n Duration: 8.113 ms\\n > Changes: \\n ----------\\n pid:\\ > n 3293\\n > retcode:\\n 0\\n stderr:\\n > stdout:\\n ----------\\n > ID: etcd\\n Function: service.running\\n > Result: False\\n Comment: Service etcd has been enabled, and > is dead\\n Started: > 13:57:01.400864\\n Duration: 30561.242 ms\\n Changes: > \\n ----------\\n etcd:\\n > True\\n ----------\\n > ID: /etc/systemd/system/etcd.service.d/etcd.conf\\n > Function: file.managed\\n Result: True\\n > Comment: File > /etc/systemd/system/etcd.service.d/etcd.conf updated\\n Started: > 13:57:31.962373\\n Duration: 71.157 ms\\n Changes: > \\n ----------\\n > diff:\\n New file\\n > mode:\\n 0644\\n \\n > Summary for ppklablinux31\\n -------------\\n > Succeeded: 18 (changed=9)\\n Failed: 1\\n -------------\\n > Total states run: 19\\n To tal > run time: 33.080 s\\n\", \"name\": \"etcd_proxy_setup\", > \"start_time\": \"13:56:57.390285\", \"result\": false, \"duration\": > 45614.033, \"__run_num__\ ": 5, > \"__jid__\": \"20170418135657522690\", \"changes\": {\"ret\": > {\"null-0050568c7c69.pfizer.com \": > {\"file_|-/etc/pki/trust/anchors_|-/etc/pki/trust/ancho > rs_|-directory\": {\"comment\": \"Directory > /etc/pki/trust/anchors is in the correct state\", \"pchanges\": {}, > \"name\": \"/etc/pki/trust/anchors\", \"start_ > time\": \"13:57:02.841138\", \"result\": true, \"duration\": > 0.957, \"__run_num__\": 3, \"changes\": {}, \"__id__\": > \"/etc/pki/trust/anchors\"}, \"group_|-et > cd_|-etcd_|-present\": {\"comment\": \"Group etcd is present and up > to date\", \"name\": \"etcd\", \"start_time\": \"13:57:05.446135\", > \"result\": true, \"du ration\": 0.478, > \"__run_num__\": 10, \"changes\": {}, \"__id__\": \"etcd\"}, > \"file_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": > {\"comment\": \" File > /etc/pki/minion.key exists with proper permissions. No changes made.\", > \"pchanges\": {}, \"name\": \"/etc/pki/minion.key\", \"start_time\": > \"13:57:04.6 75638\", \"result\": true, > \"duration\": 0.806, \"__run_num__\": 7, \"changes\": {}, \"__id__\": > \"/etc/pki/minion.key\"}, \"file_|-/etc/pki/trust/anchors/SUS > > E_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": > {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists > with proper permis sions. No changes > made.\", \"pchanges\": {}, \"name\": > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > \"13:57:02.868940\", \"result\": true, \" > duration\": 0.844, \"__run_num__\": 5, \"changes\": {}, \"__id__\": > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > \"file_|-/etc/systemd/system/etcd.service.d > > /etcd.conf_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-managed\": > {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf > updated\", \"pchanges \": {}, \"name\": > \"/etc/systemd/system/etcd.service.d/etcd.conf\", \"start_time\": > \"13:57:07.212834\", \"result\": true, \"duration\": 71.567, > \"__run_num__ \": 18, \"changes\": > {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": > \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, > \"file_|-/etc/pki/minion.crt > _|-/etc/pki/minion.crt_|-managed\": {\"comment\": \"File > /etc/pki/minion.crt exists with proper permissions. No changes made.\", > \"pchanges\": {}, \"name\": \ > "/etc/pki/minion.crt\", \"start_time\": \"13:57:05.443918\", > \"result\": true, \"duration\": 0.834, \"__run_num__\": 9, \"changes\": > {}, \"__id__\": \"/etc/pk > i/minion.crt\"}, > \"x509_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed\": > {\"comment\": \"File /etc/pki/t > rust/anchors/SUSE_CaaSP_CA.crt updated\", \"pchanges\": {}, \"name\": > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > \"13:57:02.865531\", \"res ult\": true, > \"duration\": 3.272, \"__run_num__\": 4, \"changes\": {\"diff\": \"New > file\"}, \"__id__\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > \"file > _|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": > {\"comment\": \"File /etc/zypp/repos.d/containers.repo updated\", \"pcha > nges\": {}, \"name\": > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > \"13:56:58.408694\", \"result\": true, \"duration\": 153.355, > \"__run_num__\": 0, \"changes\": > {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": > \"/etc/zypp/repos.d/containers.repo\"}, > \"pkg_|-etcd_|-etcd_|-installed\": {\"comment\ > ": \"All specified packages are already installed\", \"name\": > \"etcd\", \"start_time\": \"13:57:05.454362\", \"result\": true, > \"duration\": 13.399, \"__run_ num__\": > 13, \"changes\": {}, \"__id__\": \"etcd\"}, > \"service_|-etcd_|-etcd_|-running\": {\"comment\": \"Service etcd has > been enabled, and is running\", \"n > ame\": \"etcd\", \"start_time\": \"13:57:05.747520\", \"__id__\": > \"etcd\", \"duration\": 1465.078, \"__run_num__\": 17, \"changes\": > {\"etcd\": true}, \"resu lt\": true}, > \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": > \"Package python-M2Crypto is already installed\", \"name\": > \"python-M2Cry pto\", \"start_time\": > \"13:57:02.340920\", \"result\": true, \"duration\": 498.795, > \"__run_num__\": 1, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, > \" user_|-etcd_|-etcd_|-present\": > {\"comment\": \"User etcd is present and up to date\", \"name\": > \"etcd\", \"start_time\": \"13:57:05.450830\", \"result\": tr > ue, \"duration\": 1.177, \"__run_num__\": 11, > \"changes\": {}, \"__id__\": \"etcd\"}, > \"file_|-etcd_|-/var/lib/etcd_|-directory\": {\"comment\": \"Directory / > var/lib/etcd updated\", \"pchanges\": > {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, \"name\": \"/var/lib/etcd\", > \"start_time\": \"13:57:05.452433\", \"result\": > true, \"duration\": 1.332, \"__run_num__\": 12, \"changes\": > {\"mode\": \"0700\"}, \"__id__\": \"etcd\"}, > \"file_|-/etc/sysconfig/etcd_|-/etc/sysconfig/etcd_ > |-managed\": {\"comment\": \"File /etc/sysconfig/etcd > updated\", \"pchanges\": {}, \"name\": \"/etc/sysconfig/etcd\", > \"start_time\": \"13:57:05.605471\", \"r > esult\": true, \"duration\": 83.655, \"__run_num__\": 15, \"changes\": > {\"diff\": \"--- \\n+++ \\n@@ -1,47 +1,30 @@\\n-# > [member]\\n-ETCD_NAME=default\\n-ETCD > _DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n-#ETCD_ > > ELECTION_TIMEOUT=\\\"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380\\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\"http://localhost:2379\\\"\\n-#ETCD_MAX_SN > > APSHOTS=\\\"5\\\"\\n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"http://localhost:2380\\\"\\n- > # if you use different ETCD_NAME (e.g. > test), set ETCD_INITIAL_CLUSTER value for this name, i.e. > \\\"test=http://...\\\"\\n-#ETCD_INITIAL_CLUSTER=\\\"default= > > http://localhost:2380\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ADVERTISE_CLIENT_URLS=\\\"htt > > p://localhost:2379\\\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\\\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-#ETCD_DISCOVERY_PROXY=\\\"\\\" > > \\n-#\\n-#[proxy]\\n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\\n-#ETCD_PROXY_DIAL_TIMEOU > > T=\\\"1000\\\"\\n-#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FILE=\\\"\\\"\\n-#ETCD_KEY_FI > > LE=\\\"\\\"\\n-#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER_KEY_FILE=\\\"\\\"\\n-#ETC > > D_PEER_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n-#\\n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# > examples for -log-package-le vels > etcdserver=WARNING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_LEVELS=\\\"\\\"\\n+# > etcd proxy configuration\\n+# see > https://coreos.com/etcd/docs/latest/op-guid > > e/configuration.html\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\"null-0050568c7c69.pfizer.com > \\\"\\n+\\n+ETCD_LISTEN_CLIENT_URLS=\\\"http://0 > > .0.0.0:2379\\\"\\n+ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380\\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\"http://null-0050568c7c69.pfizer.com:2379,http://10 > > .34.246.88:2379\\\"\\n+\\n+ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/pki/minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minion.key\\n > > +ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FILE=/etc/p > > ki/minion.crt\\n+ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# > ETCD_PEER_CLIENT_CERT_AUTH= on\\n+# > ETCD_PEER_AUTO_TLS=on\\n+\\n+# > discovery\\n+ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DISCOVERY_F > > ALLBACK=\\\"proxy\\\"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"https://null-0050568c7c69.pfizer.com:2380,https:// > 10.34.246.88:2380 > \\\"\\n+ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n\", > \"group\": \"etcd\", \"user\": \"etcd\"}, \"__id__\": > \"/etc/sysconfig/etcd\"}, \"x509_| > -/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-certificate_managed\": > {\"comment\": \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, > \"name\": \"/etc/pki /minion.crt\", > \"start_time\": \"13:57:04.676856\", \"result\": true, \"duration\": > 766.905, \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": > {\"N ot After\": \"2017-07-27 > 13:57:05\", \"SHA-256 Finger Print\": > \"D2:F8:80:38:D9:D5:1C:C0:EC:9A:3E:5A:34:C2:F8:22:36:E5:DB:C0:F3:E8:E3:7A:1D:60:96:5F:FD:23:FD: > 5E\", \"Subject Hash\": > \"0F:F8:79:4C\", \"Serial Number\": \"25:B5:7F:89:5A:2F:2E:B1\", \"SHA1 > Finger Print\": \"1F:2B:E1:94:FA:EF:F4:4C:43:D1:5B:E9:8C:2D:5C > :3F:46:99:70:DD\", \"X509v3 Extensions\": > {\"subjectKeyIdentifier\": > \"15:A9:34:9A:0C:C6:72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", > \"keyUsage\": \"critical Key > Encipherment\", \"authorityKeyIdentifier\": > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > Ri > ver/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > ", > \"basicConstraints\": \"critical CA:FA > LSE\"}, \"MD5 Finger Print\": > \"72:69:54:30:5F:7D:BD:F7:6B:14:8C:6B:90:DD:8D:D2\", \"Version\": 3, > \"Key Size\": 4096, \"Public Key\": \"-----BEGIN PUBLIC KEY > > -----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48\\nAI+NcJgLaa5aV+B9 > > xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfn > > dRWaSVjF6flFn2feylfJgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQh > > \\nU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/\\n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\neNAIdetOQuzr/EEBBSfg+ > > dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi8\\n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n-----END > P UBLIC KEY-----\\n\", \"Issuer\": > {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAdd > ress\": \"hari.mahadevan at pfizer.com > \", \"GN\": \"None\", \"surname\": > \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > Before\": \"2017-04- 18 13:57:05\", > \"Subject\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > \"null-0050568c7c69.pfizer.com \", > \"SP\": \"NY\", \"L\": \"Pearl River\" > , \"emailAddress\": \"hari.mahadevan at pfizer.com > \", \"GN\": \"None\", \"surname\": > \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/minion.crt does not > exist.\ "}}, \"__id__\": > \"/etc/pki/minion.crt\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": > {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchange > s\": {}, \"name\": \"/etc/pki\", > \"start_time\": \"13:57:02.839911\", \"result\": true, \"duration\": > 1.089, \"__run_num__\": 2, \"changes\": {}, \"__id__\": > \"/etc/pki\"}, \"cmd_|-etcd_|-rm -rf > /var/lib/etcd/*_|-run\": {\"comment\": \"Command \\\"rm -rf > /var/lib/etcd/*\\\" run\", \"name\": \"rm -rf /var/lib/etcd/* > \", \"start_time\": \"13:57:05.737534\", > \"result\": true, \"duration\": 8.905, \"__run_num__\": 16, \"changes\": > {\"pid\": 3150, \"retcode\": 0, \"stderr\": > \"\", \"stdout\": \"\"}, \"__id__\": \"etcd\"}, > \"iptables_|-etcd_|-etcd_|-append\": {\"comment\": \"Set iptables rule > for etcd to: /usr/sbin/iptables --wait > -t filter -A INPUT -p tcp -m state --state NEW -m multiport --dports > 2379,2380,4001 --jump ACCEPT for ipv4\", \"name\": \"etcd\", > \"start_time\": \"13:57:05. 500990\", > \"result\": true, \"duration\": 103.789, \"__run_num__\": 14, > \"changes\": {\"locale\": \"etcd\"}, \"__id__\": \"etcd\"}, > \"x509_|-/etc/pki/minion.k > ey_|-/etc/pki/minion.key_|-private_key_managed\": {\"comment\": \"File > /etc/pki/minion.key updated\", \"pchanges\": {}, \"name\": > \"/etc/pki/minion.key\", \"s > tart_time\": \"13:57:02.870325\", \"result\": true, \"duration\": > 1805.146, \"__run_num__\": 6, \"changes\": \"New private key > generated\", \"__id__\": \"/etc > /pki/minion.key\"}}}, \"out\": \"highstate\"}, \"__id__\": > \"etcd_proxy_setup\"}, > \"salt_|-kube_haproxy_setup_|-kube_haproxy_setup_|-state\": > {\"comment\": \" One or more requisite > failed: orch.kubernetes.kube_master_setup\", \"__run_num__\": 8, > \"__sls__\": \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > > \"salt_|-mine_update_|-mine.update_|-function\": {\"comment\": > \"Function ran successfully. Function mine.update ran on > null-0050568c7c69.pfizer.com , ca, > ppkl ablinux31.\", \"name\": > \"mine.update\", \"start_time\": \"13:55:30.895706\", \"result\": true, > \"duration\": 15215.053, \"__run_num__\": 0, \"__jid__\": \"20 > 170418135531035630\", \"changes\": {\"ret\": > {\"null-0050568c7c69.pfizer.com \": > true, \"ca\": null, \"ppklablinux31\": true}, \"out\": \"highstate\"}, > \"__id_ _\": \"mine_update\"}, > \"salt_|-etcd_discovery_setup_|-etcd_discovery_setup_|-state\": > {\"comment\": \"States ran successfully. Updating ppklablinux31.\", \"n > ame\": \"etcd_discovery_setup\", > \"start_time\": \"13:56:26.822228\", \"result\": true, \"duration\": > 15283.009, \"__run_num__\": 3, \"__jid__\": \"2017041813 > 5626951275\", \"changes\": {\"ret\": > {\"ppklablinux31\": {\"cmd_|-set_size_|-curl -L -X PUT > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_c > onfig/size -d value=1_|-run\": {\"comment\": > \"Command \\\"curl -L -X PUT > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size > -d valu e=1\\\" run\", \"name\": \"curl > -L -X PUT > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size > -d value=1\", \"start_time\": \"13:56:3 > 1.855687\", \"result\": true, \"duration\": 80.902, \"__run_num__\": 4, > \"changes\": {\"pid\": 3252, \"retcode\": 0, \"stderr\": \" % Total > % Received % X ferd Average Speed > Time Time Time Current\\n Dload > Upload Total Spent Left Speed\\n\\r 0 0 0 0 > 0 0 0 0 --:--:-- --:--:-- > --:--:-- 0\\r100 121 100 114 100 7 7709 473 --:--:-- > --:--:-- --:--:-- 8142\", \"stdout\": \"{ > > \\\"action\\\":\\\"set\\\",\\\"node\\\":{\\\"key\\\":\\\"/_etcd/registry/k8s/_config/size\\\",\\\"value\\\":\\\"1\\\",\\\"modifiedIndex\\\":6,\\\"createdIndex > \\\":6}}\"}, \"__id__\": \"set_size\"}, > \"pkg_|-cleanup_|-etcdctl_|-installed\": {\"comment\": \"Package etcdctl > is already installed\", \"name\": \"etcdctl\" > , \"start_time\": \"13:56:30.443368\", \"result\": true, > \"duration\": 481.147, \"__run_num__\": 1, \"changes\": {}, \"__id__\": > \"cleanup\"}, \"file_|-/etc/z > ypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers.repo_|-managed\": > {\"comment\": \"File /etc/zypp/repos.d/containers.repo updated\", > \"pchanges\": { }, \"name\": > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > \"13:56:27.452640\", \"result\": true, \"duration\": 196.93, > \"__run_num__\": 0, \"changes \": > {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": > \"/etc/zypp/repos.d/containers.repo\"}, > \"pkg_|-set_size_|-curl_|-installed\": {\"comment\": \"P > ackage curl is already installed\", \"name\": \"curl\", > \"start_time\": \"13:56:31.841690\", \"result\": true, \"duration\": > 13.602, \"__run_num__\": 3, \"cha > nges\": {}, \"__id__\": \"set_size\"}, \"cmd_|-cleanup_|-etcdctl > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > /_etcd/registry/k8s_|-run\": {\"comment > \": \"check_cmd determined the state succeeded\", \"name\": \"etcdctl > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > /_etcd/registry/k8s\", \"start_tim e\": > \"13:56:30.943924\", \"__id__\": \"cleanup\", \"duration\": 897.534, > \"__run_num__\": 2, \"changes\": {\"pid\": 3246, \"retcode\": 4, > \"stderr\": \"Error : dial tcp > [::1]:2379: getsockopt: connection refused\", \"stdout\": \"\"}, > \"result\": true}}}, \"out\": \"highstate\"}, \"__id__\": > \"etcd_discovery_setup\ "}, > \"salt_|-refresh_pillar_|-saltutil.refresh_pillar_|-function\": > {\"comment\": \"Function ran successfully. Function > saltutil.refresh_pillar ran on null-00 > 50568c7c69.pfizer.com , ca, > ppklablinux31.\", \"name\": \"saltutil.refresh_pillar\", \"start_time\": > \"13:55:46.110938\", \"result\": true, \"duration\": 15249 > .608, \"__run_num__\": 1, \"__jid__\": > \"20170418135546241343\", \"changes\": {\"ret\": > {\"null-0050568c7c69.pfizer.com \": > true, \"ca\": true, \"ppklablinux31 \": > true}, \"out\": \"highstate\"}, \"__id__\": \"refresh_pillar\"}, > \"salt_|-etcd_nodes_setup_|-etcd_nodes_setup_|-state\": {\"comment\": > \"States ran succes sfully.\", > \"name\": \"etcd_nodes_setup\", \"start_time\": \"13:56:42.106031\", > \"result\": true, \"duration\": 15283.737, \"__run_num__\": 4, > \"changes\": {} , \"__id__\": > \"etcd_nodes_setup\"}, > \"salt_|-kube_minion_setup_|-kube_minion_setup_|-state\": {\"comment\": > \"One or more requisite failed: orch.kubernetes.k > ube_master_setup\", \"__run_num__\": 7, \"__sls__\": > \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > \"salt_|-kube_nfs_setup_|-kube_nfs_setup_|-stat > e\": {\"comment\": \"States ran successfully.\", \"name\": > \"kube_nfs_setup\", \"start_time\": \"13:57:43.005316\", \"result\": > true, \"duration\": 15395.687, > \"__run_num__\": 9, \"changes\": {}, \"__id__\": \"kube_nfs_setup\"}}, > \"retcode\": 1}}, \"success\": false, \"_stamp\": > \"2017-04-18T13:57:58.404025\", \"us > er\": \"saltapi\", \"fun\": > \"runner.state.orchestrate\"}","alter_time":"2017-04-18T13:57:58.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":" > > 2017-04-18T13:58:02.000Z","processed_at":"2017-04-18T13:58:02.000Z","worker_id":"worker1"},{"id":85,"tag":"key","data":"{\"_stamp\": > \"2017-04-19T13:13:57.297 326\", > \"rotate_aes_key\": > true}","alter_time":"2017-04-19T13:13:57.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04-19T13:13:59.000Z" > > ,"processed_at":"2017-04-19T13:13:59.000Z","worker_id":"worker1"}] > ppklablinux30-010034246250:~ # > > On Wed, Apr 19, 2017 at 11:26 AM, Rafael Fern?ndez L?pez > > wrote: > > Hello, > > On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > > > > > Installed each VM individually booting from the iso image, using static > > IP address, gateway and DNS for each. > > > > > > > > After build the CaaS installer comes up with an incorrect/wierd hostname > > for each system > > > > > > > > Admin: ppklablinux30.localdomain > > > > Master: ppklablinux31.localdomain > > > > Worker: null-0050568c7c69 > > Could you please login into the Admin node and provide the output of the > following commands? > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts Pillar.all.to_json" > > and > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts SaltEvent.all.to_json" > > > Thank you, > Rafael Fern?ndez L?pez. > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > > > > > -- > Hari Mahadevan > 914 564 2224 (c) > 914 417 4292 (h) > hari at mahadevan.net -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 488 bytes Desc: OpenPGP digital signature URL: From Liam.McCafferty at smartodds.co.uk Thu Apr 20 06:12:46 2017 From: Liam.McCafferty at smartodds.co.uk (Liam McCafferty) Date: Thu, 20 Apr 2017 12:12:46 +0000 Subject: [caasp-beta] adding additional nodes to CAAS cluster In-Reply-To: <1492606466.13951.18.camel@suse.com> References: <1492606192.8223.3.camel@suse.com>, <1492606466.13951.18.camel@suse.com> Message-ID: <1492690365937.30423@smartodds.co.uk> Hi Guys, What's the best way of adding an additional node to the cluster after it has already been created? do you run the typical kube way or is there a suse way? ______________________________________________________________________ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com ______________________________________________________________________ This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL From rob.knight at suse.com Thu Apr 20 06:14:20 2017 From: rob.knight at suse.com (Rob Knight) Date: Thu, 20 Apr 2017 12:14:20 +0000 Subject: [caasp-beta] adding additional nodes to CAAS cluster In-Reply-To: <1492690365937.30423@smartodds.co.uk> References: <1492606192.8223.3.camel@suse.com>, <1492606466.13951.18.camel@suse.com>, <1492690365937.30423@smartodds.co.uk> Message-ID: As far as I'm aware (and happy to be corrected) there is no way to do this in the current beta with CaaS Platform and this is a planned feature on the roadmap. Sent from my iPhone - please excuse any shortness > On 20 Apr 2017, at 13:12, Liam McCafferty wrote: > > Hi Guys, > > What's the best way of adding an additional node to the cluster after it has already been created? do you run the typical kube way or is there a suse way? > > ______________________________________________________________________ > This email has been scanned by the Symantec Email Security.cloud service. > For more information please visit http://www.symanteccloud.com > ______________________________________________________________________ > > This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta From Liam.McCafferty at smartodds.co.uk Thu Apr 20 09:08:11 2017 From: Liam.McCafferty at smartodds.co.uk (Liam McCafferty) Date: Thu, 20 Apr 2017 15:08:11 +0000 Subject: [caasp-beta] adding additional nodes to CAAS cluster In-Reply-To: References: <1492606192.8223.3.camel@suse.com>, <1492606466.13951.18.camel@suse.com>, <1492690365937.30423@smartodds.co.uk>, Message-ID: <1492700891223.39379@smartodds.co.uk> Great thanks , One more question, kubernetes Deployments seem to require apiVersion: apps/v1beta1 according to their documentation, however, using this reports cannot find type. error validating data: couldn't find type: v1beta1.Deployment https://kubernetes.io/docs/concepts/workloads/controllers/deployment/ Is this missing or has someone managed to get deployments working? Cheers, Liam ________________________________________ From: Rob Knight Sent: 20 April 2017 13:14 To: Liam McCafferty Cc: Paul Gonin; Jason Evans; caasp-beta at lists.suse.com Subject: Re: [caasp-beta] adding additional nodes to CAAS cluster As far as I'm aware (and happy to be corrected) there is no way to do this in the current beta with CaaS Platform and this is a planned feature on the roadmap. Sent from my iPhone - please excuse any shortness > On 20 Apr 2017, at 13:12, Liam McCafferty wrote: > > Hi Guys, > > What's the best way of adding an additional node to the cluster after it has already been created? do you run the typical kube way or is there a suse way? > > ______________________________________________________________________ > This email has been scanned by the Symantec Email Security.cloud service. > For more information please visit http://www.symanteccloud.com > ______________________________________________________________________ > > This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta ______________________________________________________________________ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com ______________________________________________________________________ This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL ______________________________________________________________________ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com ______________________________________________________________________ This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL From oliver at itc.li Thu Apr 20 09:21:16 2017 From: oliver at itc.li (Oliver Liebel) Date: Thu, 20 Apr 2017 17:21:16 +0200 Subject: [caasp-beta] adding additional nodes to CAAS cluster In-Reply-To: <1492700891223.39379@smartodds.co.uk> References: <1492606192.8223.3.camel@suse.com> <1492606466.13951.18.camel@suse.com> <1492690365937.30423@smartodds.co.uk> <1492700891223.39379@smartodds.co.uk> Message-ID: apiVersion: extensions/v1beta1 - not "apps/v1beta1" Am 20.04.2017 um 17:08 schrieb Liam McCafferty: > Great thanks , > > One more question, > > kubernetes Deployments seem to require apiVersion: apps/v1beta1 according to their documentation, however, using this reports cannot find type. > > error validating data: couldn't find type: v1beta1.Deployment > > https://kubernetes.io/docs/concepts/workloads/controllers/deployment/ > > Is this missing or has someone managed to get deployments working? > > Cheers, > > Liam > > > > ________________________________________ > From: Rob Knight > Sent: 20 April 2017 13:14 > To: Liam McCafferty > Cc: Paul Gonin; Jason Evans; caasp-beta at lists.suse.com > Subject: Re: [caasp-beta] adding additional nodes to CAAS cluster > > As far as I'm aware (and happy to be corrected) there is no way to do this in the current beta with CaaS Platform and this is a planned feature on the roadmap. > > Sent from my iPhone - please excuse any shortness > >> On 20 Apr 2017, at 13:12, Liam McCafferty wrote: >> >> Hi Guys, >> >> What's the best way of adding an additional node to the cluster after it has already been created? do you run the typical kube way or is there a suse way? >> >> ______________________________________________________________________ >> This email has been scanned by the Symantec Email Security.cloud service. >> For more information please visit http://www.symanteccloud.com >> ______________________________________________________________________ >> >> This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL >> _______________________________________________ >> caasp-beta mailing list >> caasp-beta at lists.suse.com >> http://lists.suse.com/mailman/listinfo/caasp-beta > ______________________________________________________________________ > This email has been scanned by the Symantec Email Security.cloud service. > For more information please visit http://www.symanteccloud.com > ______________________________________________________________________ > > This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL > > ______________________________________________________________________ > This email has been scanned by the Symantec Email Security.cloud service. > For more information please visit http://www.symanteccloud.com > ______________________________________________________________________ > > This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta From rushi.ns at sap.com Thu Apr 20 10:23:30 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Thu, 20 Apr 2017 16:23:30 +0000 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> Message-ID: It might be one of thre reason where minion can fail , please make sure DNS is available for Master and minons (nslookup output) Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: on behalf of Steven Mustafa Date: Thursday, April 20, 2017 at 6:14 PM To: "caasp-beta at lists.suse.com" Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? My issues are still the same. From DVD, no autoyast or SMT, NTP fixed. The Administrative node installs fine, but the minions fail. Nothing that I can tell is the primary cause. Later when I log into the minion, kubectl is installed, but it cannot seem to find the master for some reason. The vmnet network these nodes are on don?t actually have DNS, is that the cause? Steven Mustafa Cloud Solutions Architect SUSE EMEA Dubai, Dubai Internet City, Building 2 (P)+971 56 815 1333 (P)+962 79 602 7284 steven.mustafa at suse.com [ttps://www.suse.com/email/img/2016/email_signature_suse.png] -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 3662 bytes Desc: image001.png URL: From hari at mahadevan.net Thu Apr 20 10:39:36 2017 From: hari at mahadevan.net (Hari Mahadevan) Date: Thu, 20 Apr 2017 12:39:36 -0400 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> Message-ID: it has not worked for for me despite using DNS, NTP. see thread "CaaS 1.0 beta2 Installer issues with hostnames" CaaS installer generates an incorrect hostname which is different from the DNS record and bootstrapping consistently fails because of this incorrect hostname.... i have to test to bootstrapping after accessing the velum webpage using IPA instead of the hostname as per recent suggestion, will post the results after my testing. On Thu, Apr 20, 2017 at 12:23 PM, Ns, Rushi wrote: > It might be one of thre reason where minion can fail , please make sure > DNS is available for Master and minons (nslookup output) > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > *From: * on behalf of Steven Mustafa < > Steven.Mustafa at suse.com> > *Date: *Thursday, April 20, 2017 at 6:14 PM > *To: *"caasp-beta at lists.suse.com" > *Subject: *[caasp-beta] Has someone managed to install this thing > successfully from the DVD version? > > > > My issues are still the same. > > From DVD, no autoyast or SMT, NTP fixed. > > The Administrative node installs fine, but the minions fail. > > > > Nothing that I can tell is the primary cause. Later when I log into the > minion, kubectl is installed, but it cannot seem to find the master for > some reason. > > The vmnet network these nodes are on don?t actually have DNS, is that the > cause? > > > > *Steven Mustafa* > Cloud Solutions Architect > SUSE > EMEA > Dubai, Dubai Internet City, Building 2 > (P)+971 56 815 1333 <+971%2056%20815%201333> > > (P)+962 79 602 7284 > > steven.mustafa at suse.com > > [image: ttps://www.suse.com/email/img/2016/email_signature_suse.png] > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 3662 bytes Desc: not available URL: From rushi.ns at sap.com Thu Apr 20 10:43:32 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Thu, 20 Apr 2017 16:43:32 +0000 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> Message-ID: <8216A113-1FE3-4AE2-8F43-6761E71F80B7@sap.com> That?s not true, I have built the cluster right after march 30th (when beta released day) and it worked for me like charm except NTP which I figure out and informed to beta list guys. The only thing you need to make sure to configure master/minions all set with NTP server and important to have the same ?zone where you are setting up servers (Americas/Asia). Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Hari Mahadevan Date: Thursday, April 20, 2017 at 6:39 PM To: "Ns, Rushi" Cc: Steven Mustafa , "caasp-beta at lists.suse.com" Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? it has not worked for for me despite using DNS, NTP. see thread "CaaS 1.0 beta2 Installer issues with hostnames" CaaS installer generates an incorrect hostname which is different from the DNS record and bootstrapping consistently fails because of this incorrect hostname.... i have to test to bootstrapping after accessing the velum webpage using IPA instead of the hostname as per recent suggestion, will post the results after my testing. On Thu, Apr 20, 2017 at 12:23 PM, Ns, Rushi > wrote: It might be one of thre reason where minion can fail , please make sure DNS is available for Master and minons (nslookup output) Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: > on behalf of Steven Mustafa > Date: Thursday, April 20, 2017 at 6:14 PM To: "caasp-beta at lists.suse.com" > Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? My issues are still the same. From DVD, no autoyast or SMT, NTP fixed. The Administrative node installs fine, but the minions fail. Nothing that I can tell is the primary cause. Later when I log into the minion, kubectl is installed, but it cannot seem to find the master for some reason. The vmnet network these nodes are on don?t actually have DNS, is that the cause? Steven Mustafa Cloud Solutions Architect SUSE EMEA Dubai, Dubai Internet City, Building 2 (P)+971 56 815 1333 (P)+962 79 602 7284 steven.mustafa at suse.com [tps://www.suse.com/email/img/2016/email_signature_suse.png] _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 3663 bytes Desc: image001.png URL: From Steven.Mustafa at suse.com Thu Apr 20 10:45:11 2017 From: Steven.Mustafa at suse.com (Steven Mustafa) Date: Thu, 20 Apr 2017 16:45:11 +0000 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: <8216A113-1FE3-4AE2-8F43-6761E71F80B7@sap.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> <8216A113-1FE3-4AE2-8F43-6761E71F80B7@sap.com> Message-ID: <14D213ED24360C4CBFADC2BA9BE26D560107DFD8@NWBXMB01.microfocus.com> I did that, you mentioned it in the last email, but I still have not succeeded. From: Ns, Rushi [mailto:rushi.ns at sap.com] Sent: Thursday, April 20, 2017 7:44 PM To: Hari Mahadevan Cc: caasp-beta at lists.suse.com; Steven Mustafa Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? That?s not true, I have built the cluster right after march 30th (when beta released day) and it worked for me like charm except NTP which I figure out and informed to beta list guys. The only thing you need to make sure to configure master/minions all set with NTP server and important to have the same ?zone where you are setting up servers (Americas/Asia). Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Hari Mahadevan > Date: Thursday, April 20, 2017 at 6:39 PM To: "Ns, Rushi" > Cc: Steven Mustafa >, "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? it has not worked for for me despite using DNS, NTP. see thread "CaaS 1.0 beta2 Installer issues with hostnames" CaaS installer generates an incorrect hostname which is different from the DNS record and bootstrapping consistently fails because of this incorrect hostname.... i have to test to bootstrapping after accessing the velum webpage using IPA instead of the hostname as per recent suggestion, will post the results after my testing. On Thu, Apr 20, 2017 at 12:23 PM, Ns, Rushi > wrote: It might be one of thre reason where minion can fail , please make sure DNS is available for Master and minons (nslookup output) Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: > on behalf of Steven Mustafa > Date: Thursday, April 20, 2017 at 6:14 PM To: "caasp-beta at lists.suse.com" > Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? My issues are still the same. From DVD, no autoyast or SMT, NTP fixed. The Administrative node installs fine, but the minions fail. Nothing that I can tell is the primary cause. Later when I log into the minion, kubectl is installed, but it cannot seem to find the master for some reason. The vmnet network these nodes are on don?t actually have DNS, is that the cause? Steven Mustafa Cloud Solutions Architect SUSE EMEA Dubai, Dubai Internet City, Building 2 (P)+971 56 815 1333 (P)+962 79 602 7284 steven.mustafa at suse.com [tps://www.suse.com/email/img/2016/email_signature_suse.png] _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 3663 bytes Desc: image001.png URL: From rushi.ns at sap.com Thu Apr 20 11:28:50 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Thu, 20 Apr 2017 17:28:50 +0000 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: <14D213ED24360C4CBFADC2BA9BE26D560107DFD8@NWBXMB01.microfocus.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> <8216A113-1FE3-4AE2-8F43-6761E71F80B7@sap.com> <14D213ED24360C4CBFADC2BA9BE26D560107DFD8@NWBXMB01.microfocus.com> Message-ID: <96C297A3-7007-4486-9F49-C9DF204981DB@sap.com> if you boot with DVD you will get this screen where it will prompt for hostname and network. Did you set here the hostname properly with domain name. ?look my output. I quickly did 3 node cluster from DVD and I set all hostnames with FQDN, NTP , zone before clicking the bootstrap cluster from velu dasbboard. [cid:image001.png at 01D2BA0C.5570DEC0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Steven Mustafa Date: Thursday, April 20, 2017 at 6:45 PM To: "Ns, Rushi" , Hari Mahadevan Cc: "caasp-beta at lists.suse.com" Subject: RE: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? I did that, you mentioned it in the last email, but I still have not succeeded. From: Ns, Rushi [mailto:rushi.ns at sap.com] Sent: Thursday, April 20, 2017 7:44 PM To: Hari Mahadevan Cc: caasp-beta at lists.suse.com; Steven Mustafa Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? That?s not true, I have built the cluster right after march 30th (when beta released day) and it worked for me like charm except NTP which I figure out and informed to beta list guys. The only thing you need to make sure to configure master/minions all set with NTP server and important to have the same ?zone where you are setting up servers (Americas/Asia). Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Hari Mahadevan > Date: Thursday, April 20, 2017 at 6:39 PM To: "Ns, Rushi" > Cc: Steven Mustafa >, "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? it has not worked for for me despite using DNS, NTP. see thread "CaaS 1.0 beta2 Installer issues with hostnames" CaaS installer generates an incorrect hostname which is different from the DNS record and bootstrapping consistently fails because of this incorrect hostname.... i have to test to bootstrapping after accessing the velum webpage using IPA instead of the hostname as per recent suggestion, will post the results after my testing. On Thu, Apr 20, 2017 at 12:23 PM, Ns, Rushi > wrote: It might be one of thre reason where minion can fail , please make sure DNS is available for Master and minons (nslookup output) Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: > on behalf of Steven Mustafa > Date: Thursday, April 20, 2017 at 6:14 PM To: "caasp-beta at lists.suse.com" > Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? My issues are still the same. From DVD, no autoyast or SMT, NTP fixed. The Administrative node installs fine, but the minions fail. Nothing that I can tell is the primary cause. Later when I log into the minion, kubectl is installed, but it cannot seem to find the master for some reason. The vmnet network these nodes are on don?t actually have DNS, is that the cause? Steven Mustafa Cloud Solutions Architect SUSE EMEA Dubai, Dubai Internet City, Building 2 (P)+971 56 815 1333 (P)+962 79 602 7284 steven.mustafa at suse.com [ps://www.suse.com/email/img/2016/email_signature_suse.png] _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 120670 bytes Desc: image001.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 3664 bytes Desc: image002.png URL: From Steven.Mustafa at suse.com Thu Apr 20 11:32:42 2017 From: Steven.Mustafa at suse.com (Steven Mustafa) Date: Thu, 20 Apr 2017 17:32:42 +0000 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: <96C297A3-7007-4486-9F49-C9DF204981DB@sap.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> <8216A113-1FE3-4AE2-8F43-6761E71F80B7@sap.com> <14D213ED24360C4CBFADC2BA9BE26D560107DFD8@NWBXMB01.microfocus.com> <96C297A3-7007-4486-9F49-C9DF204981DB@sap.com> Message-ID: <14D213ED24360C4CBFADC2BA9BE26D560107E0A4@NWBXMB01.microfocus.com> Same here. But how did you manage NTP here? I had to wait until the first boot was done before I could use timedatectl From: Ns, Rushi [mailto:rushi.ns at sap.com] Sent: Thursday, April 20, 2017 8:29 PM To: Hari Mahadevan ; Steven Mustafa Cc: caasp-beta at lists.suse.com Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? if you boot with DVD you will get this screen where it will prompt for hostname and network. Did you set here the hostname properly with domain name. ?look my output. I quickly did 3 node cluster from DVD and I set all hostnames with FQDN, NTP , zone before clicking the bootstrap cluster from velu dasbboard. [cid:image001.png at 01D2BA15.414B2910] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Steven Mustafa > Date: Thursday, April 20, 2017 at 6:45 PM To: "Ns, Rushi" >, Hari Mahadevan > Cc: "caasp-beta at lists.suse.com" > Subject: RE: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? I did that, you mentioned it in the last email, but I still have not succeeded. From: Ns, Rushi [mailto:rushi.ns at sap.com] Sent: Thursday, April 20, 2017 7:44 PM To: Hari Mahadevan > Cc: caasp-beta at lists.suse.com; Steven Mustafa > Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? That?s not true, I have built the cluster right after march 30th (when beta released day) and it worked for me like charm except NTP which I figure out and informed to beta list guys. The only thing you need to make sure to configure master/minions all set with NTP server and important to have the same ?zone where you are setting up servers (Americas/Asia). Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Hari Mahadevan > Date: Thursday, April 20, 2017 at 6:39 PM To: "Ns, Rushi" > Cc: Steven Mustafa >, "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? it has not worked for for me despite using DNS, NTP. see thread "CaaS 1.0 beta2 Installer issues with hostnames" CaaS installer generates an incorrect hostname which is different from the DNS record and bootstrapping consistently fails because of this incorrect hostname.... i have to test to bootstrapping after accessing the velum webpage using IPA instead of the hostname as per recent suggestion, will post the results after my testing. On Thu, Apr 20, 2017 at 12:23 PM, Ns, Rushi > wrote: It might be one of thre reason where minion can fail , please make sure DNS is available for Master and minons (nslookup output) Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: > on behalf of Steven Mustafa > Date: Thursday, April 20, 2017 at 6:14 PM To: "caasp-beta at lists.suse.com" > Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? My issues are still the same. From DVD, no autoyast or SMT, NTP fixed. The Administrative node installs fine, but the minions fail. Nothing that I can tell is the primary cause. Later when I log into the minion, kubectl is installed, but it cannot seem to find the master for some reason. The vmnet network these nodes are on don?t actually have DNS, is that the cause? Steven Mustafa Cloud Solutions Architect SUSE EMEA Dubai, Dubai Internet City, Building 2 (P)+971 56 815 1333 (P)+962 79 602 7284 steven.mustafa at suse.com [ps://www.suse.com/email/img/2016/email_signature_suse.png] _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 120670 bytes Desc: image001.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 3664 bytes Desc: image002.png URL: From hari at mahadevan.net Thu Apr 20 11:36:33 2017 From: hari at mahadevan.net (Hari Mahadevan) Date: Thu, 20 Apr 2017 13:36:33 -0400 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: <96C297A3-7007-4486-9F49-C9DF204981DB@sap.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> <8216A113-1FE3-4AE2-8F43-6761E71F80B7@sap.com> <14D213ED24360C4CBFADC2BA9BE26D560107DFD8@NWBXMB01.microfocus.com> <96C297A3-7007-4486-9F49-C9DF204981DB@sap.com> Message-ID: Yes, i did that for ex: on my Admin node, i used ppklablinux30 as the Hostname in the install screen however it generated a fictitious hostname 'ppklablinux30-010034246250' ppklablinux30-010034246250:~ # hostname ppklablinux30-010034246250 ppklablinux30-010034246250:~ # cat /etc/hosts |grep ppklab X.X.X.X ppklablinux30 ppklablinux30 Not sure why its doing this.... On Thu, Apr 20, 2017 at 1:28 PM, Ns, Rushi wrote: > if you boot with DVD you will get this screen where it will prompt for > hostname and network. > > > > Did you set here the hostname properly with domain name. ?look my output. > > > > I quickly did 3 node cluster from DVD and I set all hostnames with FQDN, > NTP , zone before clicking the bootstrap cluster from velu dasbboard. > > > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > *From: *Steven Mustafa > *Date: *Thursday, April 20, 2017 at 6:45 PM > *To: *"Ns, Rushi" , Hari Mahadevan > *Cc: *"caasp-beta at lists.suse.com" > *Subject: *RE: [caasp-beta] Has someone managed to install this thing > successfully from the DVD version? > > > > I did that, you mentioned it in the last email, but I still have not > succeeded. > > > > *From:* Ns, Rushi [mailto:rushi.ns at sap.com] > *Sent:* Thursday, April 20, 2017 7:44 PM > *To:* Hari Mahadevan > *Cc:* caasp-beta at lists.suse.com; Steven Mustafa > *Subject:* Re: [caasp-beta] Has someone managed to install this thing > successfully from the DVD version? > > > > That?s not true, I have built the cluster right after march 30th (when > beta released day) and it worked for me like charm except NTP which I > figure out and informed to beta list guys. > > > > The only thing you need to make sure to configure master/minions all set > with NTP server and important to have the same ?zone where you are > setting up servers (Americas/Asia). > > > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > *From: *Hari Mahadevan > *Date: *Thursday, April 20, 2017 at 6:39 PM > *To: *"Ns, Rushi" > *Cc: *Steven Mustafa , "caasp-beta at lists.suse.com" > > *Subject: *Re: [caasp-beta] Has someone managed to install this thing > successfully from the DVD version? > > > > it has not worked for for me despite using DNS, NTP. see thread "CaaS 1.0 > beta2 Installer issues with hostnames" > > > > CaaS installer generates an incorrect hostname which is different from the > DNS record and bootstrapping consistently fails because of this incorrect > hostname.... > > > > i have to test to bootstrapping after accessing the velum webpage using > IPA instead of the hostname as per recent suggestion, will post the results > after my testing. > > > > On Thu, Apr 20, 2017 at 12:23 PM, Ns, Rushi wrote: > > It might be one of thre reason where minion can fail , please make sure > DNS is available for Master and minons (nslookup output) > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > *From: * on behalf of Steven Mustafa < > Steven.Mustafa at suse.com> > *Date: *Thursday, April 20, 2017 at 6:14 PM > *To: *"caasp-beta at lists.suse.com" > *Subject: *[caasp-beta] Has someone managed to install this thing > successfully from the DVD version? > > > > My issues are still the same. > > From DVD, no autoyast or SMT, NTP fixed. > > The Administrative node installs fine, but the minions fail. > > > > Nothing that I can tell is the primary cause. Later when I log into the > minion, kubectl is installed, but it cannot seem to find the master for > some reason. > > The vmnet network these nodes are on don?t actually have DNS, is that the > cause? > > > > *Steven Mustafa* > Cloud Solutions Architect > SUSE > EMEA > Dubai, Dubai Internet City, Building 2 > (P)+971 56 815 1333 <+971%2056%20815%201333> > > (P)+962 79 602 7284 > > steven.mustafa at suse.com > > [image: ps://www.suse.com/email/img/2016/email_signature_suse.png] > > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > > > > > -- > > Hari Mahadevan > 914 564 2224 <(914)%20564-2224> (c) > 914 417 4292 <(914)%20417-4292> (h) > hari at mahadevan.net > -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 3664 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 120670 bytes Desc: not available URL: From rushi.ns at sap.com Thu Apr 20 11:37:12 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Thu, 20 Apr 2017 17:37:12 +0000 Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? In-Reply-To: <14D213ED24360C4CBFADC2BA9BE26D560107E0A4@NWBXMB01.microfocus.com> References: <14D213ED24360C4CBFADC2BA9BE26D560107DF4B@NWBXMB01.microfocus.com> <8216A113-1FE3-4AE2-8F43-6761E71F80B7@sap.com> <14D213ED24360C4CBFADC2BA9BE26D560107DFD8@NWBXMB01.microfocus.com> <96C297A3-7007-4486-9F49-C9DF204981DB@sap.com> <14D213ED24360C4CBFADC2BA9BE26D560107E0A4@NWBXMB01.microfocus.com> Message-ID: <84FAAD60-1998-4939-8A2B-441B108164CD@sap.com> Once the installation completed, you can logon to MicroOS as normal SSH connection to all hosts that are added to velum dashboard with the below steps. 1) Setup NTP /etc/ntp.conf server yourntpserver iburst 2) restart service ntpd restart 3) enable systemctl enable ntpd 4) Setup Timezone with symbolic lync host:/etc # ls /usr/share/zoneinfo/US/Pacific-New /usr/share/zoneinfo/US/Pacific-New host # ln -s /usr/share/zoneinfo/US/Pacific localtime host # date after this you can goto velum dashboard and select whichever is master and bootstrap cluster. Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Steven Mustafa Date: Thursday, April 20, 2017 at 7:32 PM To: "Ns, Rushi" , Hari Mahadevan Cc: "caasp-beta at lists.suse.com" Subject: RE: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? Same here. But how did you manage NTP here? I had to wait until the first boot was done before I could use timedatectl From: Ns, Rushi [mailto:rushi.ns at sap.com] Sent: Thursday, April 20, 2017 8:29 PM To: Hari Mahadevan ; Steven Mustafa Cc: caasp-beta at lists.suse.com Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? if you boot with DVD you will get this screen where it will prompt for hostname and network. Did you set here the hostname properly with domain name. ?look my output. I quickly did 3 node cluster from DVD and I set all hostnames with FQDN, NTP , zone before clicking the bootstrap cluster from velu dasbboard. [cid:image001.png at 01D2BA0D.7341A9B0] Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Steven Mustafa > Date: Thursday, April 20, 2017 at 6:45 PM To: "Ns, Rushi" >, Hari Mahadevan > Cc: "caasp-beta at lists.suse.com" > Subject: RE: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? I did that, you mentioned it in the last email, but I still have not succeeded. From: Ns, Rushi [mailto:rushi.ns at sap.com] Sent: Thursday, April 20, 2017 7:44 PM To: Hari Mahadevan > Cc: caasp-beta at lists.suse.com; Steven Mustafa > Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? That?s not true, I have built the cluster right after march 30th (when beta released day) and it worked for me like charm except NTP which I figure out and informed to beta list guys. The only thing you need to make sure to configure master/minions all set with NTP server and important to have the same ?zone where you are setting up servers (Americas/Asia). Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: Hari Mahadevan > Date: Thursday, April 20, 2017 at 6:39 PM To: "Ns, Rushi" > Cc: Steven Mustafa >, "caasp-beta at lists.suse.com" > Subject: Re: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? it has not worked for for me despite using DNS, NTP. see thread "CaaS 1.0 beta2 Installer issues with hostnames" CaaS installer generates an incorrect hostname which is different from the DNS record and bootstrapping consistently fails because of this incorrect hostname.... i have to test to bootstrapping after accessing the velum webpage using IPA instead of the hostname as per recent suggestion, will post the results after my testing. On Thu, Apr 20, 2017 at 12:23 PM, Ns, Rushi > wrote: It might be one of thre reason where minion can fail , please make sure DNS is available for Master and minons (nslookup output) Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE From: > on behalf of Steven Mustafa > Date: Thursday, April 20, 2017 at 6:14 PM To: "caasp-beta at lists.suse.com" > Subject: [caasp-beta] Has someone managed to install this thing successfully from the DVD version? My issues are still the same. From DVD, no autoyast or SMT, NTP fixed. The Administrative node installs fine, but the minions fail. Nothing that I can tell is the primary cause. Later when I log into the minion, kubectl is installed, but it cannot seem to find the master for some reason. The vmnet network these nodes are on don?t actually have DNS, is that the cause? Steven Mustafa Cloud Solutions Architect SUSE EMEA Dubai, Dubai Internet City, Building 2 (P)+971 56 815 1333 (P)+962 79 602 7284 steven.mustafa at suse.com [cid:image002.png at 01D2BA0D.7341A9B0] _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.png Type: image/png Size: 120671 bytes Desc: image001.png URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image002.png Type: image/png Size: 3665 bytes Desc: image002.png URL: From hari at mahadevan.net Thu Apr 20 21:12:54 2017 From: hari at mahadevan.net (Hari Mahadevan) Date: Thu, 20 Apr 2017 23:12:54 -0400 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames In-Reply-To: References: <77f28473-2c63-56be-3919-c832f15442e1@suse.com> Message-ID: after investigating further, DHCP on the vm's is causing all sorts of issues... even though i choose 'static' IP addressing in the CaaS installer screen, DHCP is getting enabled for eth0 with "BOOTPROTO=dhcp" in ifcfg-eth0 file. The 3 vm's reside in a subnet that responds to dhcp requests, so the vm's are getting an additional DHCP address, the hostname for the DHCP address (ppklablinux30-010034246250, null-0050568c7c69 etc) is overwriting the default hostname. disabling wicked DHCP service didnt help, the service is getting started at boot time regardless of being disabled and the 2nd DHCP IPA is getting configured on the interface....also setting BOOTPROTO=static in ifcfg-eth0 is getting overwritten to the default (dhcp) during service restart and system boot. So I set DHCLIENT_SET_HOSTNAME="no" in /etc/sysconfig/network/dhcp, restarted all the nodes and now the hostnames are back to normal. This issue with interfaces defaulting to DHCP needs get addressed, perhaps I would not have seen this issue if my subnet didn't respond to DHCP requests, but not in this case and should be fixed. I will attempt to bootstrap and update the results tomorrow. On Thu, Apr 20, 2017 at 6:07 AM, Rafael Fern?ndez L?pez < rfernandezlopez at suse.com> wrote: > Hello, > > Based on the output I think that you visited Velum (the web UI to set up > the cluster) in a way that the rest of the cluster wasn't able to resolve. > > On the Beta 2 version we make the assumption that the way you visit the > UI (http://administration-node-name.localdomain) in order to bootstrap > the cluster is how the rest of the cluster will start the etcd discovery > (using in this case administration-node-name.localdomain). In future > versions we will ask explicitly for this value so you can bootstrap the > cluster through the UI using a hostname or an IP address and set this > value that the rest of the cluster will use to a different one (so they > aren't tied). > > If you try to visit velum when you set the certificate information using > the machine IP address instead of a name, can you confirm it is still > failing please? > > > Regards, > Rafael Fern?ndez L?pez. > > On 04/19/2017 05:36 PM, Hari Mahadevan wrote: > > > > ppklablinux30-010034246250:~ # docker exec -it $(docker ps | grep > > velum-dashboard | awk '{print $1}') bundle exec rails runner "puts > > Pillar.all.to_json" > > [{"id":1,"minion_id":null,"pillar":"certificate_information.subject_ > properties.O","value":"Pfizer","created_at":"2017-04-18T13: > 51:29.000Z","updated_at":"2017- > > > > 04-18T13:51:29.000Z"},{"id":2,"minion_id":null,"pillar":" > certificate_information.subject_properties.OU","value" > :"BTI","created_at":"2017-04-18T13:51:29.000Z", > > > > "updated_at":"2017-04-18T13:51:29.000Z"},{"id":3,"minion_ > id":null,"pillar":"certificate_information.subject_properties.Email"," > value":"hari.mahadevan at pfizer.c > > > > om","created_at":"2017-04-18T13:51:29.000Z","updated_at" > :"2017-04-18T13:51:29.000Z"},{"id":4,"minion_id":null," > pillar":"certificate_information.subject_proper > > > > ties.C","value":"US","created_at":"2017-04-18T13:51:29.000Z" > ,"updated_at":"2017-04-18T13:51:29.000Z"},{"id":5,"minion_ > id":null,"pillar":"certificate_informati > > on.subject_properties.ST > > ","value":"NY","created_at" > :"2017-04-18T13:51:29.000Z","updated_at":"2017-04-18T13:51: > 29.000Z"},{"id":6,"minion_id":null,"pillar":"cer > > > > tificate_information.subject_properties.L","value":"Pearl > > River","created_at":"2017-04-18T13:51:29.000Z","updated_at" > :"2017-04-18T13:51:29.000Z"},{"id":7,"min > > > > ion_id":null,"pillar":"dashboard","value":"ppklablinux30.pfizer.com > > ","created_at":"2017-04- > 18T13:51:30.000Z","updated_at":"2017-04-18T13:51:30.000Z"}] > > ppklablinux30-010034246250:~ # > > ppklablinux30-010034246250:~ # docker exec -it $(docker ps | grep > > velum-dashboard | awk '{print $1}') bundle exec rails runner "puts > > SaltEvent.all.to_json" > > > > [{"id":1,"tag":"salt/auth","data":"{\"_stamp\": > > \"2017-04-18T13:14:12.208279\", \"act\": \"accept\", \"id\": > > \"null-0050568303b8.pfizer.com \", > > \"pub\": \"---- -BEGIN PUBLIC > > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBb23dp3u0hEhGC > CzIPg\\np2ajpBqKDkWXPjz2rfxr52sL72HaU7mvoGjNR8qTA8smuseIvwg2AtwvT0dKo4v+\\ > > > > n5g8sn9OJjLr3r7PJUnWkmUxFCgpdOgoLtL6TvsGxrxmIUvIOl/ > vpn0i8i7pKJ6gY\\nD2WNEfk7d+39Ptm7yEPgrbgA6TCUQYyjlJW/o/ > mtuBunZP0FBgeUe5zZggM7W4ix\\nFZmW9zr0Q/sscR9gHRF/jFB > > > > NPI/b+VaPbXYHxaFL0Tefg9CL/5uL1uoXk+QIU1dt\\ > nRXrcmUAMwmz9vBpnctn8shlZEeo5kDYahyyh/KdQeXdit7dtZ5+ > dCVKSz0PUX4SM\\nkwIDAQAB\\n-----END > > PUBLIC KEY-----\", \"result \": > > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:14:13.000Z","processed_at":"2017-0 > > > > 4-18T13:14:13.000Z","worker_id":"worker1"},{"id":2,"tag":" > salt/auth","data":"{\"_stamp\": > > \"2017-04-18T13:14:12.227590\", \"act\": \"accept\", \"id\": \"ca\", > > \"pub\": \"-----BEGIN PUBLIC > > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuQ+GZ/ > yWkJ9KqzgJnygo\\npmI6wzhDHWUfpAqiaFLNpfo57IhbwTQ1qGDX/ke9pIueyijvfN > > > > 19sKuE0GIDrIYG\\nKzcfUcXmWButHA4cm34GtaOLIbA+ > NzLrOL8ylUmVSpo9KqDPhRsGzY51eFBVeyt1\\nqrmgFHYE3r2HWyGfRKDVT4yETwVGE > 4ge5GWyhZBo85gqPzx4PMVvSfvh1bmflUdr\\nrR5yhhj > > > > stVUE54wIsZXwpXReSjNFw9I+28AX3bSamP1FuBC8sqI4qcOFerA9ULbM\\ > nLqIxmEe3brBxBHuiDuajZc9pHF8tPRbVYA2yAgCMvS5z/45GPkjKnguWdmUPvDKs\\ > nMQIDAQAB\\n-----END > > PUBLIC KEY- ----\", \"result\": > > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:14:13.000Z","proce > > > > ssed_at":"2017-04-18T13:14:13.000Z","worker_id":"worker1"},{ > "id":3,"tag":"salt/auth","data":"{\"_stamp\": > > \"2017-04-18T13:14:12.255601\", \"act\": \"accept\", > > \"id\": \"ca\", \"pub\": \"-----BEGIN PUBLIC > > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuQ+GZ/ > yWkJ9KqzgJnygo\\npmI6wzhDHWUfpAqiaFLNpfo57IhbwTQ1qG > > > > DX/ke9pIueyijvfN19sKuE0GIDrIYG\\nKzcfUcXmWButHA4cm34GtaOLIbA+ > NzLrOL8ylUmVSpo9KqDPhRsGzY51eFBVeyt1\\nqrmgFHYE3r2HWyGfRKDVT4yETwVGE > 4ge5GWyhZBo85gqPzx4PMVvSfvh1b > > > > mflUdr\\nrR5yhhjstVUE54wIsZXwpXReSjNFw9I+28AX3bSamP1FuBC8sqI4qcOFerA9UL > bM\\nLqIxmEe3brBxBHuiDuajZc9pHF8tPRbVYA2yAgCMvS5z/45GPkjKnguWdmUPvDKs\\ > nMQIDAQAB\\n---- > > -END PUBLIC KEY-----\", \"result\": > > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:14 > > > > :13.000Z","processed_at":"2017-04-18T13:14:13.000Z"," > worker_id":"worker1"},{"id":4,"tag":"salt/auth","data":"{\"_stamp\": > > \"2017-04-18T13:14:12.273869\", \"ac > > t\": \"accept\", \"id\": \"null-0050568303b8.pfizer.com > > \", \"pub\": \"-----BEGIN PUBLIC > > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBb23dp3u0hEhGC > > > > CzIPg\\np2ajpBqKDkWXPjz2rfxr52sL72HaU7mvoGjNR8qTA8smuseIvwg2AtwvT0d > Ko4v+\\n5g8sn9OJjLr3r7PJUnWkmUxFCgpdOgoLtL6TvsGxrxmIUvIOl/ > vpn0i8i7pKJ6gY\\nD2WNEfk7d+39Ptm7 > > > > yEPgrbgA6TCUQYyjlJW/o/mtuBunZP0FBgeUe5zZggM7W4ix\\ > nFZmW9zr0Q/sscR9gHRF/jFBNPI/b+VaPbXYHxaFL0Tefg9CL/5uL1uoXk+QIU1dt\\ > nRXrcmUAMwmz9vBpnctn8shlZEeo5kDYahyyh/KdQ > > > > eXdit7dtZ5+dCVKSz0PUX4SM\\nkwIDAQAB\\n-----END PUBLIC KEY-----\", > > \"result\": > > true}","alter_time":"2017-04-18T13:14:12.000Z","master_id": > "ppklablinux30.locald > > > > omain_master","taken_at":"2017-04-18T13:14:13.000Z"," > processed_at":"2017-04-18T13:14:13.000Z","worker_id":" > worker1"},{"id":5,"tag":"minion_start","data":"{\"_ > > stamp\": > > \"2017-04-18T13:14:14.191910\", \"pretag\": null, \"cmd\": > > \"_minion_event\", \"tag\": \"minion_start\", \"data\": \"Minion ca > > started at Tue Apr 18 13:14:14 2017\", > > \"id\": > > \"ca\"}","alter_time":"2017-04-18T13:14:14.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:14:18.000Z" > > > > ,"processed_at":"2017-04-18T13:14:18.000Z","worker_id": > "worker1"},{"id":6,"tag":"salt/minion/ca/start","data":"{\"_stamp\": > > \"2017-04-18T13:14:14.201405\", \" > > pretag\": null, \"cmd\": \"_minion_event\", \"tag\": > > \"salt/minion/ca/start\", \"data\": \"Minion ca started at Tue Apr 18 > > 13:14:14 2017\", \"id\": \"ca\"}"," > > alter_time":"2017-04-18T13:14:14.000Z","master_id":" > ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:14:18.000Z","processed_at":"2017-04-18T13:14:1 > > > > 8.000Z","worker_id":"worker1"},{"id":7,"tag":"salt/auth"," > data":"{\"_stamp\": > > \"2017-04-18T13:26:23.660263\", \"act\": \"accept\", \"id\": > > \"ppklablinux31\", \"pub\": > > \"-----BEGIN PUBLIC > > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvRq1LkY// > WVBG0iCfJO9\\n7a7O2HhXroisxycxfu5U99wmWMfOdQVo4arIe7N9hBo8M764/M4 > > > > WQcv2Ewozm6/t\\n3Ygy3nCcfohlwMvikcMbPgW/pxcIXfQkO68y+ > IbjOSjTPpvZtE3VFfpLkyZoAnkh\\no3tEJYgH+ULyiCI4NN6CgQ08rbhEkTmesRLuCfC > Z0hjRJCyQDL0LUICxS+HQZPy0\\ne1TO2qvi > > > > kpOsY0AEWtg1a7KaXfn9KWaaiZvspRxqRdqI37zZwjzWItXCKIkORfP6\\ > ne4zZSzcI7GG1kM62yjrevNLBU+a7Z4JtOCqqc8RRUF6qiFH1/5/kRP+ > bDReVlWaa\\n5wIDAQAB\\n-----END > > PUBLIC KEY-- ---\", \"result\": > > true}","alter_time":"2017-04-18T13:26:23.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:26:23.000Z","proces > > > > sed_at":"2017-04-18T13:26:23.000Z","worker_id":"worker1"},{ > "id":8,"tag":"minion_start","data":"{\"_stamp\": > > \"2017-04-18T13:26:24.533314\", \"pretag\": null, > > \"cmd\": \"_minion_event\", \"tag\": \"minion_start\", > > \"data\": \"Minion ppklablinux31 started at Tue Apr 18 13:26:24 2017\", > > \"id\": \"ppklablinux31\"}","al > > ter_time":"2017-04-18T13:26:24.000Z","master_id":" > ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:26:28.000Z","processed_at":"2017-04-18T13:26:28. > > > > 000Z","worker_id":"worker1"},{"id":9,"tag":"salt/minion/ > ppklablinux31/start","data":"{\"_stamp\": > > \"2017-04-18T13:26:24.540701\", \"pretag\": null, \"cmd\": \ > > "_minion_event\", \"tag\": > > \"salt/minion/ppklablinux31/start\", \"data\": \"Minion ppklablinux31 > > started at Tue Apr 18 13:26:24 2017\", \"id\": \"ppklablinux3 > > > > 1\"}","alter_time":"2017-04-18T13:26:24.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:26:28.000Z","processed_at":"2017-04-18T > > > > 13:26:28.000Z","worker_id":"worker1"},{"id":10,"tag":" > salt/auth","data":"{\"_stamp\": > > \"2017-04-18T13:48:20.141772\", \"act\": \"accept\", \"id\": \"null-0050 > > 568c7c69.pfizer.com > > \", \"pub\": \"-----BEGIN PUBLIC > > KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx9fbcY1GOFMbmTJ > qOD2i\\nveCF4kySNJoQEq/ho6WxSonKI235 > > > > 8wIw+wKnATDsdlpBHh7mxsLK4YJOqGRNcXZD\\nB/ZulYbEDWy7w9kQb4FAKEjui1PkwacU > /f9XVsySEX8au1ZskyMnsrzjnOpOvhyX\\n37miIe3h7qAvXTUzxjyr2tor1YbpE > JSoR77B31SlWwtWsTfHMnEE > > > > 7fC5JjeK2426\\n7yI5n6AKst5SkMv9R07t2NJBqp17j > VZvCLEaUkjWn5CKke5MvSBRAvZPMkNt5tch\\n80D3SN0JAh4rpVT4S6SfK4IVeFZ9KV4/ > 3PpVhrc5odcRQDryJId3mbdFx8gauJk5\\nbQIDAQAB\ > > \n-----END PUBLIC KEY-----\", > > \"result\": > > true}","alter_time":"2017-04-18T13:48:20.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04-18 > > > > T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z"," > worker_id":"worker1"},{"id":11,"tag":"minion_start","data":"{\"_stamp\": > > \"2017-04-18T13:48:20.9301 29\", > > \"pretag\": null, \"cmd\": \"_minion_event\", \"tag\": \"minion_start\", > > \"data\": \"Minion null-0050568c7c69.pfizer.com > > started at Tue Apr 18 13:48:20 > > 2017\", \"id\": > > \"null-0050568c7c69.pfizer.com > > \"}","alter_time":" > 2017-04-18T13:48:20.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04- > > > > 18T13:48:24.000Z","processed_at":"2017-04-18T13:48:24.000Z" > ,"worker_id":"worker1"},{"id":12,"tag":"salt/minion/null- > 0050568c7c69.pfizer.com/start > > ","data":"{\" > > _stamp\": \"2017-04-18T13:48:20.938113\", \"pretag\": > > null, \"cmd\": \"_minion_event\", \"tag\": > > \"salt/minion/null-0050568c7c69.pfizer.com/start\ > > ", \"data\": > > \"Minion null-0050568c7c69.pfizer.com > > started at Tue Apr 18 13:48:20 > > 2017\", \"id\": \"null-0050568c7c69.pfizer.com > > \"}","alter_time":" > 2017-04-18T13:48:20.000 > > > > Z","master_id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:48:24.000Z","processed_at":"2017-04-18T13: > 48:24.000Z","worker_id":"worker1"},{"id" > > > > :13,"tag":"20170418135525163915","data":"{\"_stamp\": > > \"2017-04-18T13:55:25.165892\", \"minions\": > > [\"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:25.000 > > > > Z","master_id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:55:25.000Z","processed_at":"2017-04-18T13: > 55:25.000Z","worker_id":"worker1"},{"id" > > > > :14,"tag":"salt/job/20170418135525163915/new","data":"{\"tgt_type\": > > \"glob\", \"jid\": \"20170418135525163915\", \"tgt\": \"ppklablinux31\", > > \"_stamp\": \"20 > > 17-04-18T13:55:25.166238\", \"user\": \"saltapi\", \"arg\": [{\"key\": > > \"roles\", \"val\": [\"kube-master\"], \"__kwarg__\": true}], \"fun\": > > \"grains.append\ ", \"minions\": > > [\"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:25. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:55:25.0 > > > > 00Z","processed_at":"2017-04-18T13:55:25.000Z","worker_id": > "worker1"},{"id":15,"tag":"20170418135525237571","data":"{\"_stamp\": > > \"2017-04-18T13:55:25.238994\ ", > > \"minions\": [\"null-0050568c7c69.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:55:25.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-0 > > > > 4-18T13:55:25.000Z","processed_at":"2017-04-18T13: > 55:25.000Z","worker_id":"worker1"},{"id":16,"tag":" > salt/job/20170418135525237571/new","data":"{\"tgt_type\": > > \"glob\", \"jid\": > > \"20170418135525237571\", \"tgt\": \"null-0050568c7c69.pfizer.com > > \", \"_stamp\": > > \"2017-04-18T13:55:25.240617\", \"user\": \"saltapi\", \" > > arg\": [{\"key\": \"roles\", \"val\": > > [\"kube-minion\"], \"__kwarg__\": true}], \"fun\": \"grains.append\", > > \"minions\": [\"null-0050568c7c69.pfizer.com > > \"]}", > > > > "alter_time":"2017-04-18T13:55:25.000Z","master_id":" > ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:55:25.000Z","processed_at":"2017-04-18T13:55: > > > > 25.000Z","worker_id":"worker1"},{"id":17,"tag":"salt/job/ > 20170418135525237571/ret/null-0050568c7c69.pfizer.com > > ","data":"{\"fun_args\": [{\"key\": > > \"roles\", \ "val\": > > [\"kube-minion\"]}], \"jid\": \"20170418135525237571\", \"return\": > > {\"roles\": [\"kube-minion\"]}, \"retcode\": 0, \"success\": true, > > \"cmd\": \"_ret urn\", \"_stamp\": > > \"2017-04-18T13:55:26.092030\", \"fun\": \"grains.append\", \"id\": > > \"null-0050568c7c69.pfizer.com > > \"}","alter_time":" > 2017-04-18T13:55:26.00 > > > > 0Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:55:30.000Z","processed_at":"2017-04-18T13:55:30.000Z" > ,"worker_id":"worker1"},{"id > > > > ":18,"tag":"salt/job/20170418135525163915/ret/ > ppklablinux31","data":"{\"fun_args\": > > [{\"key\": \"roles\", \"val\": [\"kube-master\"]}], \"jid\": > > \"20170418135 525163915\", \"return\": > > {\"roles\": [\"kube-master\"]}, \"retcode\": 0, \"success\": true, > > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:26.105903\", > > \"fun\": \"grains.append\", \"id\": > > \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:26. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"201 > > > > 7-04-18T13:55:30.000Z","processed_at":"2017-04-18T13: > 55:30.000Z","worker_id":"worker1"},{"id":19,"tag":" > salt/run/20170418135525317500/new","data":"{\"fun\": > > \ "runner.state.orchestrate\", > > \"fun_args\": [{\"mods\": \"orch.kubernetes\"}], \"jid\": > > \"20170418135525317500\", \"user\": \"saltapi\", \"_stamp\": \"2017-04- > > > > 18T13:55:28.242578\"}","alter_time":"2017-04-18T13:55:28. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:55:30.000Z","processed > > > > _at":"2017-04-18T13:55:30.000Z","worker_id":"worker1"},{"id":20,"tag":" > 20170418135531035630","data":"{\"_stamp\": > > \"2017-04-18T13:55:31.035957\", \"minions\": > > [\"ca\", \"null-0050568303b8.pfizer.com > > \", \"null-0050568c7c69.pfizer.com > > \", > > \"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:31. > 000Z","master_id":"ppklab > > > > linux30.localdomain_master","taken_at":"2017-04-18T13:55: > 35.000Z","processed_at":"2017-04-18T13:55:35.000Z","worker_ > id":"worker1"},{"id":21,"tag":"salt/job/20 > > > > 170418135531035630/new","data":"{\"tgt_type\": \"glob\", \"jid\": > > \"20170418135531035630\", \"tgt\": \"*\", \"_stamp\": > > \"2017-04-18T13:55:31.036328\", \"user > > \": \"root\", \"arg\": [], \"fun\": \"mine.update\", \"minions\": > > [\"ca\", \"null-0050568303b8.pfizer.com > > \", \"null-0050568c7c69.pfizer.com > > \", \"ppklablinux31 > > > > \"]}","alter_time":"2017-04-18T13:55:31.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:55:35.000Z","processed_at":"2017-04-18T > > > > 13:55:36.000Z","worker_id":"worker1"},{"id":22,"tag":" > salt/job/20170418135531035630/ret/ca","data":"{\"fun_args\": > > [], \"jid\": \"20170418135531035630\", \"re > > turn\": null, \"retcode\": 0, \"success\": true, \"cmd\": > > \"_return\", \"_stamp\": \"2017-04-18T13:55:31.081600\", \"fun\": > > \"mine.update\", \"id\": \"ca\"}", > > "alter_time":"2017-04-18T13:55:31.000Z","master_id":" > ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:55:36.000Z","processed_at":"2017-04-18T13:55: > > > > 36.000Z","worker_id":"worker1"},{"id":23,"tag":"salt/job/ > 20170418135531035630/ret/null-0050568c7c69.pfizer.com > > ","data":"{\"fun_args\": [], > > \"jid\": \"20170418 135531035630\", > > \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": > > \"_return\", \"_stamp\": \"2017-04-18T13:55:31.616291\", \"fun\": > > \"mine.update\ ", \"id\": > > \"null-0050568c7c69.pfizer.com > > \"}","alter_time":" > 2017-04-18T13:55:31.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13 > > > > :55:36.000Z","processed_at":"2017-04-18T13:55:36.000Z"," > worker_id":"worker1"},{"id":24,"tag":"salt/job/20170418135531035630/ret/ > ppklablinux31","data":"{\"fun_ > > args\": [], \"jid\": > > \"20170418135531035630\", \"return\": true, \"retcode\": 0, \"success\": > > true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55:31.63 > > 5163\", \"fun\": \"mine.update\", \"id\": > > \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:31. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at > > > > ":"2017-04-18T13:55:36.000Z","processed_at":"2017-04-18T13: > 55:36.000Z","worker_id":"worker1"},{"id":25,"tag":" > 20170418135536062539","data":"{\"_stamp\": > > \"201 7-04-18T13:55:36.064042\", > > \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:55:36.000Z","master_id":"ppklablinux30.localdomain_ma > > > > ster","taken_at":"2017-04-18T13:55:36.000Z","processed_ > at":"2017-04-18T13:55:36.000Z","worker_id":"worker1"},{"id": > 26,"tag":"salt/job/20170418135536062539/new > > ","data":"{\"tgt_type\": \"list\", > > \"jid\": \"20170418135536062539\", \"tgt\": > > [\"null-0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:55:36.064366\", > > \"user\": \"root\", \"arg\": [\"20170418135531035630\"], \"fun\": > > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time":"2017 > > > > -04-18T13:55:36.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:55:36.000Z"," > processed_at":"2017-04-18T13:55:36.000Z","worker_i > > > > d":"worker1"},{"id":27,"tag":"20170418135546241343","data":"{\"_stamp\": > \"2017-04-18T13:55:46.241646\", > > \"minions\": [\"ca\", \"null-0050568303b8.pfizer.com > > \ > > ", \"null-0050568c7c69.pfizer.com > > \", > > \"ppklablinux31\"]}","alter_time":"2017-04-18T13:55:46. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2 > > > > 017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13: > 55:46.000Z","worker_id":"worker1"},{"id":28,"tag":" > salt/job/20170418135546241343/new","data":"{\"tgt_ty > > pe\": \"glob\", \"jid\": > > \"20170418135546241343\", \"tgt\": \"*\", \"_stamp\": > > \"2017-04-18T13:55:46.242055\", \"user\": \"root\", \"arg\": [], > > \"fun\": \"sal tutil.refresh_pillar\", > > \"minions\": [\"ca\", \"null-0050568303b8.pfizer.com > > \", \"null-0050568c7c69.pfizer.com > > \", > > \"ppklablinux31\"]}","alter_time":"2017-04-1 > > > > 8T13:55:46.000Z","master_id":"ppklablinux30.localdomain_ > master","taken_at":"2017-04-18T13:55:46.000Z","processed_ > at":"2017-04-18T13:55:46.000Z","worker_id":"w > > > > orker1"},{"id":29,"tag":"salt/job/20170418135546241343/ret/n > ull-0050568c7c69.pfizer.com > > ","data":"{\"fun_args\": [], > > \"jid\": \"20170418135546241343\", \"retur > > n\": true, \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", > > \"_stamp\": \"2017-04-18T13:55:46.303253\", \"fun\": > > \"saltutil.refresh_pillar\", \"id\": > > \"null-0050568c7c69.pfizer.com > > \"}","alter_time":" > 2017-04-18T13:55:46.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:55:46.000Z > > > > ","processed_at":"2017-04-18T13:55:46.000Z","worker_id": > "worker1"},{"id":30,"tag":"salt/job/20170418135546241343/ > ret/ppklablinux31","data":"{\"fun_args\": > > [], \"jid\": \"20170418135546241343\", > > \"return\": true, \"retcode\": 0, \"success\": true, \"cmd\": > > \"_return\", \"_stamp\": \"2017-04-18T13:55:46.308953\", \"f > > un\": \"saltutil.refresh_pillar\", \"id\": > > \"ppklablinux31\"}","alter_time":"2017-04-18T13:55:46. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_a > > > > t":"2017-04-18T13:55:46.000Z","processed_at":"2017-04-18T13: > 55:46.000Z","worker_id":"worker1"},{"id":31,"tag":" > salt/job/20170418135546241343/ret/ca","data":"{ > > \"fun_args\": [], \"jid\": > > \"20170418135546241343\", \"return\": true, \"retcode\": 0, \"success\": > > true, \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:55 > > :46.533656\", \"fun\": \"saltutil.refresh_pillar\", > > \"id\": > > \"ca\"}","alter_time":"2017-04-18T13:55:46.000Z","master_ > id":"ppklablinux30.localdomain_master","t > > > > aken_at":"2017-04-18T13:55:51.000Z","processed_at":"2017-04- > 18T13:55:51.000Z","worker_id":"worker1"},{"id":32,"tag":" > 20170418135551309779","data":"{\"_stamp\" > > : \"2017-04-18T13:55:51.311099\", > > \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:55:51.000Z","master_id":"ppklablinux30.localdo > > > > main_master","taken_at":"2017-04-18T13:55:51.000Z"," > processed_at":"2017-04-18T13:55:51.000Z","worker_id":" > worker1"},{"id":33,"tag":"salt/job/20170418135551309 > > 779/new","data":"{\"tgt_type\": > > \"list\", \"jid\": \"20170418135551309779\", \"tgt\": > > [\"null-0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:55:51.31 1436\", > > \"user\": \"root\", \"arg\": [\"20170418135546241343\"], \"fun\": > > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time > > > > ":"2017-04-18T13:55:51.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:55:51.000Z"," > processed_at":"2017-04-18T13:55:51.000Z","w > > > > orker_id":"worker1"},{"id":34,"tag":"20170418135601489588"," > data":"{\"_stamp\": > > \"2017-04-18T13:56:01.489905\", \"minions\": [\"ca\", > > \"null-0050568303b8.pfiz er.com > > \"]}","alter_time":"2017-04-18T13:56:01. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:56:01.000Z","processed_at":"2017- > > > > 04-18T13:56:01.000Z","worker_id":"worker1"},{"id":35,"tag":"salt/job/ > 20170418135601489588/new","data":"{\"tgt_type\": > > \"grain\", \"jid\": \"201704181356014895 > > 88\", \"tgt\": \"roles:ca\", \"_stamp\": > > \"2017-04-18T13:56:01.492098\", \"user\": \"root\", \"arg\": > > [{\"queue\": false, \"concurrent\": false, \"saltenv\": > > \"base\", \"__kwarg__\": true}], \"fun\": > > \"state.highstate\", \"minions\": [\"ca\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:01.000 > > > > Z","master_id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:56:01.000Z","processed_at":"2017-04-18T13: > 56:01.000Z","worker_id":"worker1"},{"id" > > > > :36,"tag":"20170418135606552474","data":"{\"_stamp\": > > \"2017-04-18T13:56:06.552868\", \"minions\": [\"ca\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time":" > > > > 2017-04-18T13:56:06.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:56:06.000Z"," > processed_at":"2017-04-18T13:56:06.000Z","work > > > > er_id":"worker1"},{"id":37,"tag":"salt/job/20170418135606552474/new"," > data":"{\"tgt_type\": > > \"list\", \"jid\": \"20170418135606552474\", \"tgt\": [\"ca\", \"n > > ull-0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:56:06.553728\", \"user\": \"root\", \"arg\": > > [\"20170418135601489588\"], \"fun\": \"saltutil.find_ > > job\", \"minions\": [\"ca\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:06.000Z","master_id":"ppklablinux30. > localdomain_master","taken > > > > _at":"2017-04-18T13:56:06.000Z","processed_at":"2017-04- > 18T13:56:06.000Z","worker_id":"worker1"},{"id":38,"tag":" > salt/job/20170418135606552474/ret/ca","data": > > "{\"fun_args\": > > [\"20170418135601489588\"], \"jid\": \"20170418135606552474\", > > \"return\": {\"tgt_type\": \"grain\", \"jid\": \"20170418135601489588\", > > \"tgt\ ": \"roles:ca\", \"pid\": 86, > > \"ret\": \"\", \"user\": \"root\", \"arg\": [{\"queue\": false, > > \"concurrent\": false, \"saltenv\": \"base\", \"__kwarg__\": tru > > e}], \"fun\": \"state.highstate\"}, > > \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": > > \"2017-04-18T13:56:06.608556\", \"fun\": \"saltutil.f > > ind_job\", \"id\": > > \"ca\"}","alter_time":"2017-04-18T13:56:06.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:56:06.000Z","proc > > > > essed_at":"2017-04-18T13:56:06.000Z","worker_id":"worker1" > },{"id":39,"tag":"salt/job/20170418135601489588/ret/ca"," > data":"{\"fun_args\": > > [{\"queue\": false, \ "concurrent\": > > false, \"saltenv\": \"base\"}], \"jid\": \"20170418135601489588\", > > \"return\": > > {\"file_|-/etc/pki/issued_certs_|-/etc/pki/issued_certs_|-direct > > ory\": {\"comment\": \"Directory > > /etc/pki/issued_certs updated\", \"pchanges\": > > {\"/etc/pki/issued_certs\": {\"directory\": \"new\"}}, \"name\": > > \"/etc/pki/is sued_certs\", > > \"start_time\": \"13:56:07.194634\", \"result\": true, \"duration\": > > 1.281, \"__run_num__\": 6, \"changes\": {\"/etc/pki/issued_certs\": > > \"New D ir\"}, \"__id__\": > > \"/etc/pki/issued_certs\"}, \"group_|-kube_group_|-kube_|-present\": > > {\"comment\": \"New group kube created\", \"name\": \"kube\", \"start_ > > time\": \"13:56:03.585602\", \"result\": > > true, \"duration\": 492.98, \"__run_num__\": 2, \"changes\": > > {\"passwd\": \"x\", \"gid\": 492, \"name\": \"kube\", \" > > members\": []}, \"__id__\": \"kube_group\"}, > > \"file_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-managed\": {\"comment\": > > \"File /etc/pki/ca.crt exists with proper p > > ermissions. No changes made.\", \"pchanges\": {}, \"name\": > > \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.521611\", \"result\": > > true, \"duration\": 0.817, \ > > "__run_num__\": 10, \"changes\": {}, \"__id__\": \"/etc/pki/ca.crt\"}, > > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ > repos.d/containers.repo_|-manage > > d\": {\"comment\": \"File > > /etc/zypp/repos.d/containers.repo updated\", \"pchanges\": {}, \"name\": > > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": \"13 > > :56:03.255349\", \"result\": true, \"duration\": > > 162.91, \"__run_num__\": 0, \"changes\": {\"diff\": \"New file\", > > \"mode\": \"0644\"}, \"__id__\": \"/etc/zyp > > p/repos.d/containers.repo\"}, > > \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory > > /etc/pki is in the correct state\", \"pchanges\": {}, \"na > > me\": \"/etc/pki\", \"start_time\": > > \"13:56:07.193414\", \"result\": true, \"duration\": 1.082, > > \"__run_num__\": 5, \"changes\": {}, \"__id__\": \"/etc/pki\"} > > , \"file_|-/etc/motd_|-/etc/motd_|-managed\": > > {\"comment\": \"File /etc/motd updated\", \"pchanges\": {}, \"name\": > > \"/etc/motd\", \"start_time\": \"13:56:03. > > 418415\", \"result\": true, \"duration\": 145.221, \"__run_num__\": > > 1, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -0,0 +1,3 @@\\n+Welcome to > > ppklablinux30.loc aldomain.\\n+The > > roles of this node are:\\n+ - ca\\n\"}, \"__id__\": \"/etc/motd\"}, > > \"x509_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-certificate_managed\": {\"c > > omment\": \"File /etc/pki/ca.crt > > updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.crt\", > > \"start_time\": \"13:56:08.483311\", \"result\": true, \"duration > > \": 38.149, \"__run_num__\": 9, \"changes\": > > {\"Certificate\": {\"New\": {\"Not After\": \"2027-04-16 13:56:08\", > > \"X509v3 Extensions\": {\"subjectKeyIdentifi > > er\": > > \"51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\", > > \"keyUsage\": \"critical Certificate Sign, CRL Sign\", > > \"authorityKeyIdentifier\": \"ke > > yid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F: > 5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.m > > > > ahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > > >", > > \"basicConstraints\": \"critical CA:TRUE\"}, \"Subject Hash\": > > \"2F:0B:83:D6\", \"MD5 Finge r Print\": > > \"A5:99:B1:1C:A3:48:E9:64:86:35:24:7F:41:1F:00:90\", \"SHA1 Finger > > Print\": > > \"20:2A:25:0D:0B:2F:91:E8:3F:92:F3:2B:7F:8A:C5:37:F1:1E:15:09\", \"SHA- > > 256 Finger Print\": > > \"BF:C2:6C:31:46:B9:50:13:A2:E7:AD:BF:54:5E:FB:E5:C2:4C:E1: > 38:5A:0A:80:BC:AD:FC:79:92:24:E8:A8:97\", > > \"Serial Number\": \"F1:3D:64:29:EA:0 > > 9:37:80\", \"Version\": 3, \"Key Size\": 4096, \"Public Key\": > > \"-----BEGIN PUBLIC > > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UI > XB43n > > > > \\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\ > nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ > ng8cvSHNvUx6f6R1tTbw/a > > > > SsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/ > vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/ > IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuT > > > > QOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATu > Dn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19 > TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhk > > > > UdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\ > nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\ > nWxWN792kR823ed734CmUvl3hEe > > > > AlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+ > xyFImAQEQBSUCAwEAAQ==\\n-----END > > PUBLIC KEY-----\\n\", \"Subject\": {\"C\": \"US\", \"organizationName\": > > \"Pfizer\", \"CN\": \"localdomain\", > > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > > \"hari.mahadevan at pfizer.com \", > > \"GN\": \"None\", \"surname\": \ > > "None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > > Before\": \"2017-04-18 13:56:08\", \"Issuer\": {\"C\": \"US\", > > \"organizationName\": \"Pfiz er\", > > \"CN\": \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > > \"emailAddress\": \"hari.mahadevan at pfizer.com > > \", \"GN\": \"None\", \"surname\": > > \"None\ ", \"OU\": \"BTI\"}}, \"Old\": > > \"/etc/pki/ca.crt does not exist.\"}}, \"__id__\": \"/etc/pki/ca.crt\"}, > > \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\ > > ": {\"comment\": \"Package python-M2Crypto is already > > installed\", \"name\": \"python-M2Crypto\", \"start_time\": > > \"13:56:06.872964\", \"result\": true, \"dur > > ation\": 320.254, \"__run_num__\": 4, \"changes\": {}, \"__id__\": > > \"python-M2Crypto\"}, > > \"x509_|-/etc/pki/ca.key_|-/etc/pki/ca.key_|-private_key_managed\": { > > \"comment\": \"File /etc/pki/ca.key > > updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", > > \"start_time\": \"13:56:07.198826\", \"result\": true, \"durat > > ion\": 1282.75, \"__run_num__\": 7, \"changes\": > > \"New private key generated\", \"__id__\": \"/etc/pki/ca.key\"}, > > \"file_|-/etc/pki/ca.key_|-/etc/pki/ca.key_| > > -managed\": {\"comment\": \"\", \"pchanges\": {}, \"name\": > > \"/etc/pki/ca.key\", \"start_time\": \"13:56:08.481733\", \"result\": > > true, \"duration\": 1.035, \ > > "__run_num__\": 8, \"changes\": {\"mode\": \"0600\"}, \"__id__\": > > \"/etc/pki/ca.key\"}, \"user_|-kube_user_|-kube_|-present\": > > {\"comment\": \"New user kube c > > reated\", \"name\": \"kube\", \"start_time\": \"13:56:04.094251\", > > \"result\": true, \"duration\": 602.999, \"__run_num__\": 3, > > \"changes\": {\"shell\": \"/bi > > n/bash\", \"workphone\": \"\", \"uid\": 1000, \"passwd\": \"x\", > > \"roomnumber\": \"\", \"gid\": 100, \"groups\": [\"kube\", \"users\"], > > \"home\": \"\", \"full name\": \"\", > > \"homephone\": \"\", \"name\": \"kube\"}, \"__id__\": \"kube_user\"}, > > \"module_|-mine.send_|-mine.send_|-run\": {\"comment\": \"Module > > function mine.send executed\", > > \"name\": \"mine.send\", \"start_time\": \"13:56:08.526443\", > > \"result\": true, \"duration\": 522.106, \"__run_num__\": 11, > > \"changes\": {\"ret\": true}, > > \"__id__\": \"mine.send\"}}, \"retcode\": 0, \"success\": true, \"cmd\": > > \"_return\", \"_stamp\": \"2017-04-18T13:56:09.056508\", \"fun\": \ > > "state.highstate\", \"id\": \"ca\", > > \"out\": > > \"highstate\"}","alter_time":"2017-04-18T13:56:09.000Z"," > master_id":"ppklablinux30.localdomain_master","taken_at" > > > > :"2017-04-18T13:56:11.000Z","processed_at":"2017-04-18T13: > 56:11.000Z","worker_id":"worker1"},{"id":40,"tag":" > 20170418135616772289","data":"{\"_stamp\": > > \"2017 -04-18T13:56:16.772711\", > > \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:16.000Z","master_id":"ppklablinux30.localdomain_mas > > > > ter","taken_at":"2017-04-18T13:56:21.000Z","processed_ > at":"2017-04-18T13:56:21.000Z","worker_id":"worker1"},{"id": > 41,"tag":"salt/job/20170418135616772289/new" > > ,"data":"{\"tgt_type\": \"list\", > > \"jid\": \"20170418135616772289\", \"tgt\": > > [\"null-0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:56:16.773239\", > > \"user\": \"root\", \"arg\": [\"20170418135601489588\"], \"fun\": > > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time":"2017- > > > > 04-18T13:56:16.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:56:21.000Z"," > processed_at":"2017-04-18T13:56:21.000Z","worker_id > > > > ":"worker1"},{"id":42,"tag":"20170418135626951275","data":"{\"_stamp\": > > \"2017-04-18T13:56:26.951551\", \"minions\": [\"ppklablinux31\", > > \"null-0050568303b8.p fizer.com > > \"]}","alter_time":"2017-04-18T13:56: > 26.000Z","master_id":"ppklablinux30.localdomain_ > master","taken_at":"2017-04-18T13:56:31.000Z","processed_at":"20 > > > > 17-04-18T13:56:31.000Z","worker_id":"worker1"},{"id": > 43,"tag":"salt/job/20170418135626951275/new","data":"{\"tgt_type\": > > \"grain\", \"jid\": \"201704181356269 > > 51275\", \"tgt\": \"roles:kube-master\", \"_stamp\": > > \"2017-04-18T13:56:26.953461\", \"user\": \"root\", \"arg\": > > [\"repositories,etcd-discovery\", {\"queue\" > > : false, \"concurrent\": false, \"saltenv\": \"base\", > > \"__kwarg__\": true}], \"fun\": \"state.sls\", \"minions\": > > [\"ppklablinux31\", \"null-0050568303b8.pfi > > zer.com > > \"]}","alter_time":"2017-04-18T13:56:26. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:56:31.000Z","processed_at":"2017 > > > > -04-18T13:56:31.000Z","worker_id":"worker1"},{"id":44,"tag":"salt/job/ > 20170418135626951275/ret/ppklablinux31","data":"{\"fun_args\": > > [\"repositories,etcd-disc overy\", > > {\"queue\": false, \"concurrent\": false, \"saltenv\": \"base\"}], > > \"jid\": \"20170418135626951275\", \"return\": {\"cmd_|-set_size_|-curl > > -L -X PUT > > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/ > registry/k8s/_config/size > > -d value=1_|-run\": {\"comment\": \"Command \\\"curl -L -X PUT > > http://ppklablinux > > 30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_config/size > > -d > > value=1\\\" run\", \"name\": \"curl -L -X PUT > > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd > > /registry/k8s/_config/size -d value=1\", \"start_time\": > > \"13:56:31.855687\", \"result\": true, \"duration\": 80.902, > > \"__run_num__\": 4, \"changes\": {\"pid\ > > ": 3252, \"retcode\": 0, \"stderr\": \" % Total % Received % Xferd > > Average Speed Time Time Time Current\\n > > Dloa d Upload Total > > Spent Left Speed\\n\\r 0 0 0 0 0 0 0 0 > > --:--:-- --:--:-- --:--:-- 0\\r100 121 100 114 100 7 > > 7709 473 --:--:-- --:--:-- --:--:-- > > 8142\", \"stdout\": > > \"{\\\"action\\\":\\\"set\\\",\\\"node\\\":{\\\"key\\\":\\\" > /_etcd/registry/k8s/_config/size\\\ > > > > ",\\\"value\\\":\\\"1\\\",\\\"modifiedIndex\\\":6,\\\" > createdIndex\\\":6}}\"}, > > \"__id__\": \"set_size\"}, \"pkg_|-cleanup_|-etcdctl_|-installed\": > > {\"comment\ ": \"Package etcdctl is > > already installed\", \"name\": \"etcdctl\", \"start_time\": > > \"13:56:30.443368\", \"result\": true, \"duration\": 481.147, > > \"__run_num_ _\": 1, \"changes\": {}, > > \"__id__\": \"cleanup\"}, > > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ > repos.d/containers.repo_|-managed\": > > {\"comment\": \ "File > > /etc/zypp/repos.d/containers.repo updated\", \"pchanges\": {}, \"name\": > > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > > \"13:56:27.452640\", \"r esult\": true, > > \"duration\": 196.93, \"__run_num__\": 0, \"changes\": {\"diff\": \"New > > file\", \"mode\": \"0644\"}, \"__id__\": \"/etc/zypp/repos.d/containers > > .repo\"}, \"cmd_|-cleanup_|-etcdctl > > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > > /_etcd/registry/k8s_|-run\": {\"comment\": \"check_cmd determined th > > e state succeeded\", \"name\": \"etcdctl > > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > > /_etcd/registry/k8s\", \"start_time\": \"13:56:30.943924\", \"_ > > _id__\": \"cleanup\", \"duration\": 897.534, > > \"__run_num__\": 2, \"changes\": {\"pid\": 3246, \"retcode\": 4, > > \"stderr\": \"Error: dial tcp [::1]:2379: getso > > ckopt: connection refused\", \"stdout\": \"\"}, \"result\": > > true}, \"pkg_|-set_size_|-curl_|-installed\": {\"comment\": \"Package > > curl is already installed\", \"name\": > > \"curl\", \"start_time\": \"13:56:31.841690\", \"result\": true, > > \"duration\": 13.602, \"__run_num__\": 3, \"changes\": {}, \"__id__\": > > \"set_size\ "}}, \"retcode\": 0, > > \"success\": true, \"cmd\": \"_return\", \"_stamp\": > > \"2017-04-18T13:56:31.950017\", \"fun\": \"state.sls\", \"id\": > > \"ppklablinux31\", \ "out\": > > \"highstate\"}","alter_time":"2017-04-18T13:56:31.000Z"," > master_id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:56:36.000Z","processe > > > > d_at":"2017-04-18T13:56:36.000Z","worker_id":"worker1"},{ > "id":45,"tag":"20170418135632056163","data":"{\"_stamp\": > > \"2017-04-18T13:56:32.056452\", \"minions\" > > : [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:32.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:56:36. > > > > 000Z","processed_at":"2017-04-18T13:56:36.000Z","worker_id": > "worker1"},{"id":46,"tag":"salt/job/20170418135632056163/ > new","data":"{\"tgt_type\": > > \"list\", \"j id\": > > \"20170418135632056163\", \"tgt\": [\"null-0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:56:32.056818\", \"user\": \"root\", \"arg\": [\"20170 > > 418135626951275\"], \"fun\": > > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:32.000Z","master_id":"ppk > > > > lablinux30.localdomain_master","taken_at":"2017-04-18T13:56: > 36.000Z","processed_at":"2017-04-18T13:56:36.000Z","worker_ > id":"worker1"},{"id":47,"tag":"20170418 > > 135642239202","data":"{\"_stamp\": > > \"2017-04-18T13:56:42.239530\", \"minions\": > > [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:42.000Z"," > > > > master_id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:56:46.000Z","processed_at":"2017-04-18T13: > 56:46.000Z","worker_id":"worker1"},{"id":48, > > > > "tag":"salt/job/20170418135642239202/new","data":"{\"tgt_type\": > > \"grain\", \"jid\": \"20170418135642239202\", \"tgt\": \"roles:etcd\", > > \"_stamp\": \"2017-04- > > 18T13:56:42.241642\", \"user\": \"root\", \"arg\": [{\"queue\": false, > > \"concurrent\": true, \"saltenv\": \"base\", \"__kwarg__\": true}], > > \"fun\": \"state.hi ghstate\", > > \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:42.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at" > > > > :"2017-04-18T13:56:46.000Z","processed_at":"2017-04-18T13: > 56:46.000Z","worker_id":"worker1"},{"id":49,"tag":" > 20170418135647339774","data":"{\"_stamp\": > > \"2017 -04-18T13:56:47.340292\", > > \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:47.000Z","master_id":"ppklablinux30.localdomain_mas > > > > ter","taken_at":"2017-04-18T13:56:51.000Z","processed_ > at":"2017-04-18T13:56:51.000Z","worker_id":"worker1"},{"id": > 50,"tag":"salt/job/20170418135647339774/new" > > ,"data":"{\"tgt_type\": \"list\", > > \"jid\": \"20170418135647339774\", \"tgt\": > > [\"null-0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:56:47.340837\", > > \"user\": \"root\", \"arg\": [\"20170418135642239202\"], \"fun\": > > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time":"2017- > > > > 04-18T13:56:47.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:56:51.000Z"," > processed_at":"2017-04-18T13:56:51.000Z","worker_id > > > > ":"worker1"},{"id":51,"tag":"20170418135657522690","data":"{\"_stamp\": > > \"2017-04-18T13:56:57.523922\", \"minions\": > > [\"null-0050568c7c69.pfizer.com \", > > \"ppkl ablinux31\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:57.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18 > > > > T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z"," > worker_id":"worker1"},{"id":52,"tag":"salt/job/20170418135657522690/new"," > data":"{\"tgt_type\": > > \"g rain_pcre\", \"jid\": > > \"20170418135657522690\", \"tgt\": \"roles:kube-(master|minion)\", > > \"_stamp\": \"2017-04-18T13:56:57.525807\", \"user\": \"root\", \"arg > > \": [\"repositories,etcd-proxy\", > > {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\", > > \"__kwarg__\": true}], \"fun\": \"state.sls\", \"minions\": > > [\"null-0050568c7c69.pfizer.com > > \", \"ppklablinux31\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:56:57.000Z","master_id":"ppklablinux30.l > > > > ocaldomain_master","taken_at":"2017-04-18T13:57:01.000Z"," > processed_at":"2017-04-18T13:57:01.000Z","worker_id":" > worker1"},{"id":53,"tag":"20170418135700403535 > > ","data":"{\"_stamp\": > > \"2017-04-18T13:57:00.404046\", \"minions\": > > [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_ > id":"ppklablinux30.localdomain_ > > > > master","taken_at":"2017-04-18T13:57:01.000Z","processed_ > at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{"id": > 54,"tag":"salt/job/20170418135700403535/n > > ew","data":"{\"tgt_type\": \"glob\", > > \"jid\": \"20170418135700403535\", \"tgt\": \"ca\", \"_stamp\": > > \"2017-04-18T13:57:00.404541\", \"user\": \"root\", \"arg > > \": [{\"signing_policy\": \"minion\", \"public_key\": > > \"-----BEGIN PUBLIC > > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJG > jHBEuXGuonX5+UGX > > > > OCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjmeE0UxqB > wAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/ > UxtdlQ2tkdIuwEF4IekRib7lEXhnL+ph > > > > lBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+ > CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctY > DOTpnPBU+hcg/jxXqDAVDCc > > > > L1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtGyq0/ > oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+ > iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+ > > > > B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/ > uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/ > oTjEUWIjfAhWh8kphDf5t0E2Tt2s > > eUdGCmPTyLmhY90TmUMCAwEAAQ==-----END > > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"ppklablinux31.localdomain\", > > \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\ > > ": \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, > > digitalSignature, keyEncipherment\", \"SN\": \"None\", > > \"public_key_passphrase\": \"None\", \" > > GN\": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": > > \"hari.mahadevan at pfizer.com \", > > \"basicConstraints\": \"critical CA:false\"}], \"fun\": \"x509.s > > ign_remote_certificate\", \"minions\": > > [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at":"2017-04-1 > > > > 8T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z" > ,"worker_id":"worker1"},{"id":55,"tag":"salt/job/ > 20170418135700403535/ret/ca","data":"{\"fun_args\": > > [{\"signing_policy\": \"minion\", > > \"public_key\": \"-----BEGIN PUBLIC > > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJG > jHBEuXGuonX5+UGXOCH > > > > k0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1kqPU5zMjmeE0UxqB > wAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/ > UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBN > > > > rdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+ > CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctY > DOTpnPBU+hcg/jxXqDAVDCcL1x > > > > Uy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtGyq0/ > oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+ > iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43 > > > > m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/ > uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/ > oTjEUWIjfAhWh8kphDf5t0E2Tt2seUd > > GCmPTyLmhY90TmUMCAwEAAQ==-----END > > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"ppklablinux31.localdomain\", > > \"L\": \"Pearl River\", \"O\": \"Pfizer\", \"ST\": > > \"NY\", \"days_valid\": 100, \"keyUsage\": \"nonRepudiation, > > digitalSignature, keyEncipherment\", \"SN\": \"None\", > > \"public_key_passphrase\": \"None\", \"GN\ > > ": \"None\", \"OU\": \"BTI\", \"testrun\": true, \"Email\": > > \"hari.mahadevan at pfizer.com \", > > \"basicConstraints\": \"critical CA:false\"}], \"jid\": \"201704181 > > 35700403535\", \"return\": {\"Issuer Public > > Key\": \"-----BEGIN PUBLIC > > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UI > XB43n\\nu/72U7XYV > > > > Pk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8kv72D4LzPuhtP\\ > nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ > ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E > > > > 1GcELo72rGYDZ2g00LPGq7j6S6B0Cyl\\nfomV90lGrDlIJF2ca8/ > vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/ > IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWK > > > > r7k4gIA\\nqc6QhhtT5Tyq/6TuH0owyvfRkLPIdkOIgYR8NrinATu > Dn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19 > TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk > > > > 2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmFEECGyGqA\\ > nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\ > nWxWN792kR823ed734CmUvl3hEeAlddNBtIhJij > > > > 1eq2h2OElsaW3wwQj92P5vYhg4\\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END > PUBLIC > > KEY-----\\n\", \"Not After\": \"2017-07-27 13:57:00\", \"Subject Hash\": > > \"03: 5E:85:4C\", \"Public Key\": > > \"-----BEGIN PUBLIC > > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJ > GjHBE\\nuXGuonX5+UGXOCHk0qj8onDaXX8acbDl > > > > Ncc+9JLOaMWEDgRn+4skZArYcbruEI1k\\nqPU5zMjmeE0UxqBwAAJpOswHiU3Bq > 28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\nStCc2QFH9/ > UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSS > > > > NPNtt9qu\\n7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+ > CNpZ2Vc6kHWOk0NUXnrka8KQS\\npYnZeq2Z0//7cfFUVD+ > bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\nXqDAVDCcL1xUy > > > > 7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACG\\ > nIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\ > nXp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y > > > > +B43m3RZY3I0njhBqEqEINRZ6T/\\nK/eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPsDP/ > uMJayFczYH3nDZMWJrmqhMlECa\\n/FHRhtL72iGqbv8M5AEu8fYnaY1MTyL > bLmaxpsg/oTjEUWIjfAhWh8kphDf5t > > > > 0E2\\nTt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n-----END PUBLIC KEY-----\\n\", > > \"MD5 Finger Print\": > > \"CF:98:45:78:E6:98:66:F5:7F:9C:EC:C3:24:A6:9D:75\", \"SHA1 Fing > > er Print\": > > \"35:54:DD:18:6B:B8:0A:7A:6B:E7:BC:08:F5:FD:A7:83:DB:01:9B:E7\", > > \"SHA-256 Finger Print\": > > \"35:E1:80:2E:BE:78:50:56:5C:42:EA:49:26:ED:33:6A:33:B0 > > :03:E6:5C:4F:23:34:A4:3C:6B:29:E6:DA:50:BA\", \"Serial > > Number\": \"E0:7E:3D:AB:59:B6:BC:7C\", \"Version\": 3, \"Key Size\": > > 4096, \"X509v3 Extensions\": {\"su > > bjectKeyIdentifier\": > > \"FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\", > > \"keyUsage\": \"critical Key Encipherment\", \"authorityKeyIdentifier\" > > : > > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D: > 9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress= > > > > hari.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > > 29:EA:09:37:80\\n\>", > > \"basicConstraints\": \"critical CA:FALSE\"}, \"Subject\": {\"C\": > > \"US\", \"organiza tionName\": > > \"Pfizer\", \"CN\": \"ppklablinux31.localdomain\", \"SP\": \"NY\", > > \"L\": \"Pearl River\", \"emailAddress\": \"hari.mahadevan at pfizer.com > > \", \"GN\" > > : \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer > > Hash\": \"2F:0B:83:D6\", \"Not Before\": \"2017-04-18 13:57:00\", > > \"Issuer\": {\"C\": \"US\", \" > > organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": > > \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > > \"hari.mahadevan at pfizer.com \", > > \"GN\": \"No ne\", \"surname\": > > \"None\", \"OU\": \"BTI\"}}, \"retcode\": 0, \"success\": true, \"cmd\": > > \"_return\", \"_stamp\": \"2017-04-18T13:57:00.502166\", \"fun\": > > \"x509.sign_remote_certificate\", \"id\": > > \"ca\"}","alter_time":"2017-04-18T13:57:00.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > > > > 18T13:57:01.000Z","processed_at":"2017-04-18T13:57:01.000Z" > ,"worker_id":"worker1"},{"id":56,"tag":"20170418135700795320","data":" > {\"_stamp\": > > \"2017-04-18T13: 57:00.795617\", > > \"minions\": > > [\"ca\"]}","alter_time":"2017-04-18T13:57:00.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at":"2017-04-18T13:57:01 > > > > .000Z","processed_at":"2017-04-18T13:57:01.000Z","worker_ > id":"worker1"},{"id":57,"tag":"salt/job/20170418135700795320/new"," > data":"{\"tgt_type\": > > \"glob\", \" jid\": > > \"20170418135700795320\", \"tgt\": \"ca\", \"_stamp\": > > \"2017-04-18T13:57:00.796050\", \"user\": \"root\", \"arg\": > > [{\"signing_policy\": \"minion\", \ > > "public_key\": \"-----BEGIN PUBLIC > > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJG > jHBEuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4s > > > > kZArYcbruEI1kqPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSV > pWTfmsSLSzJz62/ffStCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+ > phlBNrdUZeJ4HtSSNPNtt9qu7jRfFsgryXNIAbtfD > > > > wCcV9FEhiqxvgY7Cfp0u9+CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+ > bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1xUy7s4DvdiD4eQQag5 > 1mZSYtpzGFEK2qr23CU > > > > mZA/j/zWwok/fcACGIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+ > GcqdgL9q/GC0+ncdr+iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+ > B43m3RZY3I0njhBqEqEINRZ6T/K/eOWw8LeFK2S > > > > QT9eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa/ > FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2Tt2seU > dGCmPTyLmhY90TmUMCAwEAAQ==-----END > > PU BLIC KEY-----\", \"C\": \"US\", > > \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": > > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUs > > age\": \"nonRepudiation, digitalSignature, > > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Emai > > l\": \"hari.mahadevan at pfizer.com > > \", \"basicConstraints\": \"critical > > CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": > > [\"ca\"]}","alter_t > > ime":"2017-04-18T13:57:00.000Z","master_id":"ppklablinux30.localdomain_ > master","taken_at":"2017-04-18T13:57:01.000Z","processed_ > at":"2017-04-18T13:57:01.000Z" > > > > ,"worker_id":"worker1"},{"id":58,"tag":"salt/job/ > 20170418135700795320/ret/ca","data":"{\"fun_args\": > > [{\"signing_policy\": \"minion\", \"public_key\": \"----- > > BEGIN PUBLIC > > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJG > jHBEuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+ > 4skZArYcbruEI1kqPU5zMjme > > > > E0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ffStCc2QFH9/ > UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu7jRfFs > gryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+ > > > > CNpZ2Vc6kHWOk0NUXnrka8KQSpYnZeq2Z0//7cfFUVD+ > bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jxXqDAVDCcL1xUy7s4DvdiD4eQQag5 > 1mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACGIICtG > > > > yq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+ > iT0Aply8Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/K/ > eOWw8LeFK2SQT9eIt1neNIkZTlO3LuUPs > > > > DP/uMJayFczYH3nDZMWJrmqhMlECa/FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/ > oTjEUWIjfAhWh8kphDf5t0E2Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==-----END > > PUBLIC KEY-----\", \"C\" : \"US\", > > \"CN\": \"ppklablinux31.localdomain\", \"L\": \"Pearl River\", \"O\": > > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > > \"nonRepudiatio n, digitalSignature, > > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Email\": > > \"hari.mahadevan@ pfizer.com > > \", \"basicConstraints\": \"critical CA:false\"}], > > \"jid\": \"20170418135700795320\", \"return\": \"-----BEGIN > > CERTIFICATE-----\\nMIIHFTCCBP2gAwIBAg > > IJAMvg3ZLcfvbyMA0GCSqGSIb3DQEBCwUAMIGtMQswCQYD\\ > nVQQGEwJVUzEUMBIGA1UEAwwLbG9jYWxkb21haW4xFDASBgNVBAcMC1BlYXJsIFJp\\ > ndmVyMQswCQYDVQQIDAJOWTEPMA0GA1UECgwGUGZpem > > > > VyMQ0wCwYDVQQqDAROb25l\\nMQwwCgYDVQQLDANCVEkxKDAmBgkqh > kiG9w0BCQEWGWhhcmkubWFoYWRldmFuQHBm\\naXplci5jb20xDTALBgNVBAQMBE5vb > mUwHhcNMTcwNDE4MTM1NzAwWhcNMTcwNzI3\\ > > > > nMTM1NzAwWjCBuzELMAkGA1UEBhMCVVMxIjAgBgNVBAMMGXBwa2xhYmxpbnV4MzEu\\ > nbG9jYWxkb21haW4xFDASBgNVBAcMC1BlYXJsIFJpdmVyMQswCQYDVQQIDAJOWTEP\\ > nMA0GA1UECgwGUGZpemVyMQ0 > > > > wCwYDVQQqDAROb25lMQwwCgYDVQQLDANCVEkxKDAm\\ > nBgkqhkiG9w0BCQEWGWhhcmkubWFoYWRldmFuQHBmaXplci5jb20xDTALBgNVBAQM\\ > nBE5vbmUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoI > > > > CAQDM/FldJgEHX23i\\n0kaMcES5ca6idfn5QZc4IeTSqPyic > NpdfxpxsOU1xz70ks5oxYQOBGf7iyRkCthx\\nuu4QjWSo9TnMyOZ4TRTGoHAAAmk6z > AeJTcGrbyWmZd0dcjZdWpNtJWlZN+axItLM\\nnPrb > > > > 999K0JzZAUf39TG12VDa2R0i7AQXgh6RGJvuUReGcv6mGUE2t1Rl4nge1JI0\\ > n82232q7uNF8WyCvJc0gBu18PAJxX0USGKrG+BjsJ+nS734I2lnZVzqQdY6TQ1Ree\\ > nuRrwpBKlidl6rZnT//tx8VRUP5sE > > > > iKyHTrtq6Q9Uc0d19hqybMEcNy1gM5Omc8FT\\n6FyD+ > PFeoMBUMJwvXFTLuzgO92IPh5BBqDnWZlJi2nMYUQraqvbcJSZkD+P/NbCi\ > \nT99wAIYggK0bKrT+hWesrYBcEBWHnVUAf42eO5BYP8fL4Zyp2Av2 > > > > r8YLT6dx2v6J\\nPQCmXLxenVxBboyCIbB7txCCGCew8UQvvk+ > zyeLUaTtj4HjebdFljcjSeOEGoSoQ\\ng1FnpP8r945bDwt4UrZJBP14i3Wd4 > 0iRlOU7cu5Q+wM/+4wlrIVzNgfecNkxYmua\\nqEyUQJr8U > > > > dGG0vvaIapu/wzkAS7x9idpjUxPItsuZrGmyD+hOMRRYiN8CFaHySmE\\nN/ > m3QTZO3ax5R0YKY9PIuaFj3ROZQwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIw\\ > nADAOBgNVHQ8BAf8EBAMCBSAwHQYDVR0OB > > > > BYEFPw9Po44tac3Bs+N5SMxhfnE2y4M\\nMIHiBgNVHSMEgdowgdeAFFFzkENQf > 4q7m0JFGlFHRT9Nn1yZoYGzpIGwMIGtMQsw\\nCQYDVQQGEwJVUzEUMBIGA1UEAwwLb > G9jYWxkb21haW4xFDASBgNVBAcMC > > > > 1BlYXJs\\nIFJpdmVyMQswCQYDVQQIDAJOWTEPMA0GA1UECgwGUGZpemVyMQ0wCwYDVQQ > qDARO\\nb25lMQwwCgYDVQQLDANCVEkxKDAmBgkqhkiG9w0BCQEWGWhhcmkubWFoYWR > ldmFu\\nQHBmaXplci5jb2 > > > > 0xDTALBgNVBAQMBE5vbmWCCQDxPWQp6gk3gDANBgkqhkiG9w0B\\ > nAQsFAAOCAgEAyiPp2gH4exF4OX7vUXlqXlqPQ6Np46k/Y8y/ExXZpBiTXtOBn+ku\\n/ > n4WPszTmRktjMO8Z5NIZhXbTabXNO3oy2v/r6 > > > > He6OLJVRfgxOLJ4UpkwilzeoBQ\\n3LLqrzFGUzVCefKELLNt/ > sNZZzJUvDjwbr0xF9FUQzTjJPFIl4yLK/JMe26A5it1\\nZtqgCLUWVD2GN1PaMi/ > xPOKjtPS4aCQg8GDrCpHXgvzxoFQO7BKbjR094W4IF7 > > > > 69\\nLENZfWkF6SbYlw/ONhXUmvRq9Td8usPl8o1OIWM7zkfwyCZDmK/5Ulht/vybllm+\\ > n7tib9wJvLmLQavGpJr1PpAZfS3GnscGOZgarpWFLkTyNSO4K5rMSj/K30klK7XsS\\ > nVM3fGWlzXmr0LSoKhVw > > > > w4q0XPmttipUvPcK4v6RqxEgm5iQ7jE8PNZpUCHSlNi3I\\n2tc9ukZoWQCXg/qrAf7mm/ > 9aXkHA9+hODFhWZWQ69mCVQPZgqwJ9N7DUx8EVE6HV\\nLJYedlvh6HHucmDdYhh0/ > sj0yFCiAL9SaMkUD2fjnXf > > > > CAdY4Nh6VA+LbDn3SEtiN\\n+EseMG7Xa+uqYpBGC6gIAkdTabjJpVOSPU2dgjTF > bRP/t0WI6UISeQQV6eB0EWDh\\n2fE0JDyhZk9f1iglCfT3KgftjKpYq > Sat0wd80tVrbwTZpLKzXNVLURU=\\n-----END > > CERTIFICATE-----\\n\", \"retcode\": 0, > > \"success\": true, \"cmd\": \"_return\", \"_stamp\": > > \"2017-04-18T13:57:00.895052\", \"fun\": \"x509.sign_remote_certi > > ficate\", \"id\": > > \"ca\"}","alter_time":"2017-04-18T13:57:00.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:57:01.000Z","proce > > > > ssed_at":"2017-04-18T13:57:01.000Z","worker_id":"worker1"},{ > "id":59,"tag":"20170418135702561962","data":"{\"_stamp\": > > \"2017-04-18T13:57:02.562273\", \"minion > > s\": [\"null-0050568c7c69.pfizer.com > > \", \"ppklablinux31\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:02.000Z","master_id":"ppklablinu > > > > x30.localdomain_master","taken_at":"2017-04-18T13:57: > 06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_ > id":"worker1"},{"id":60,"tag":"salt/job/201704 > > > > 18135702561962/new","data":"{\"tgt_type\": \"list\", \"jid\": > > \"20170418135702561962\", \"tgt\": [\"null-0050568c7c69.pfizer.com > > \", \"ppklablinux31\", \"null- > > 0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:57:02.562671\", \"user\": \"root\", \"arg\": > > [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\ > > ", \"minions\": [\"null-0050568c7c69.pfizer.com > > \", \"ppklablinux31\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:02.000Z","master_id": > > > > "ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06.000Z" > ,"worker_id":"worker1"},{"id":61,"tag":"salt > > > > /job/20170418135702561962/ret/null-0050568c7c69.pfizer.com > > ","data":"{\"fun_args\": > > [\"20170418135657522690\"], \"jid\": \"20170418135702561962\", > > \"return\": {\"tgt_type\": > > \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": > > \"roles:kube-(master|minion)\", \"pid\": 3113, \"ret\": \"\", \"user\": > > \"root\", \ "arg\": > > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, > > \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\"}, > > \"retcod e\": 0, \"success\": true, > > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:02.604513\", > > \"fun\": \"saltutil.find_job\", \"id\": \"null-0050568c7c69.pfize > > r.com > > \"}","alter_time":"2017-04-18T13:57:02.000Z","master_id":" > ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:57:06.000Z","processed_at":"2017-04 > > > > -18T13:57:06.000Z","worker_id":"worker1"},{"id":62,"tag":" > salt/job/20170418135702561962/ret/ppklablinux31","data":"{\"fun_args\": > > [\"20170418135657522690\"], \"jid\": > > \"20170418135702561962\", \"return\": {\"tgt_type\": \"grain_pcre\", > > \"jid\": \"20170418135657522690\", \"tgt\": > > \"roles:kube-(master|minion)\", \"pi > > d\": 3261, \"ret\": \"\", \"user\": \"root\", \"arg\": > > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, > > \"saltenv\": \"base\", \"__kwarg __\": > > true}], \"fun\": \"state.sls\"}, \"retcode\": 0, \"success\": true, > > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T13:57:02.608875\", > > \"fun\": \"saltuti l.find_job\", > > \"id\": > > \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:02. > 000Z","master_id":"ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:57: > > > > 06.000Z","processed_at":"2017-04-18T13:57:06.000Z","worker_ > id":"worker1"},{"id":63,"tag":"20170418135704699378","data":"{\"_stamp\": > > \"2017-04-18T13:57:04.699 809\", > > \"minions\": > > [\"ca\"]}","alter_time":"2017-04-18T13:57:04.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:57:06.000Z","p > > > > rocessed_at":"2017-04-18T13:57:06.000Z","worker_id":" > worker1"},{"id":64,"tag":"salt/job/20170418135704699378/ > new","data":"{\"tgt_type\": > > \"glob\", \"jid\": \" > > 20170418135704699378\", \"tgt\": \"ca\", \"_stamp\": > > \"2017-04-18T13:57:04.700563\", \"user\": \"root\", \"arg\": > > [{\"signing_policy\": \"minion\", \"public_k > > ey\": \"-----BEGIN PUBLIC > > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ > 8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSz > > > > xL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+ > pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3l > tegKAOMmu2bZQirZr > > > > vm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+ > 8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/ > RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 > > > > KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98 > /04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/ > PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+d > > > > PdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUF > hhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+ > Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > > PUBLIC KEY- ----\", \"C\": \"US\", > > \"CN\": \"null-0050568c7c69.pfizer.com > > \", \"L\": \"Pearl River\", \"O\": > > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > > \"nonRepudiation, digitalSignature, > > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"testrun\": > > true, \"Email\": \"hari.mahadevan at pfizer.com > > \", \"basicConstraints\": \"critical > > CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": > > [\"ca\ > > "]}","alter_time":"2017-04-18T13:57:04.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:57:06.000Z","processed_at":"2017-04-18T1 > > > > 3:57:06.000Z","worker_id":"worker1"},{"id":65,"tag":" > salt/job/20170418135704699378/ret/ca","data":"{\"fun_args\": > > [{\"signing_policy\": \"minion\", \"public_k > > ey\": \"-----BEGIN PUBLIC > > KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ > 8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSz > > > > xL48AI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+ > pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3l > tegKAOMmu2bZQirZr > > > > vm8b9NgBWLGNfndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+ > 8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/ > RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 > > > > KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98 > /04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/ > PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+d > > > > PdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi809LUF > hhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+ > Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > > PUBLIC KEY- ----\", \"C\": \"US\", > > \"CN\": \"null-0050568c7c69.pfizer.com > > \", \"L\": \"Pearl River\", \"O\": > > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > > \"nonRepudiation, digitalSignature, > > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"testrun\": > > true, \"Email\": \"hari.mahadevan at pfizer.com > > \", \"basicConstraints\": \"critical > > CA:false\"}], \"jid\": \"20170418135704699378\", \"return\": {\"Issuer > > Publi c Key\": \"-----BEGIN PUBLIC > > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzZD6PArP1r2y1UI > XB43n\\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs99jcDvixS8 > > > > kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6dJSjedWbzORJo+BJ5J92r+a+ > WFHaGa9/pav\\ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6 > S6B0Cyl\\nfomV90lG > > > > rDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/lHxXp1cxldsrWOeUrvja+\\nBRgCvb/ > IhjjJ6d8dgcBGvBK4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/ > 6TuH0owyvfRkLPIdkOI > > > > gYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\nYTaNj5hvvTCU3yhoxOtMVgJWLXn19 > TyeOoxpvplgE+lo+4S4njIlVw+itNrvIG3P\\nhkUdQ4AEw/ > qEnk2iMXEs5Y9jESWX0nGD5csgMMzkt6t646JTGWvQhbmF > > > > EECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxt > vrsq6\\nWxWN792kR823ed734CmUvl3hEeAlddNBtIhJij1eq2h2OElsaW3wwQj92P5 > vYhg4\\nq1uON9QfUA+xy > > FImAQEQBSUCAwEAAQ==\\n-----END PUBLIC > > KEY-----\\n\", \"Not After\": \"2017-07-27 13:57:04\", \"Subject Hash\": > > \"0F:F8:79:4C\", \"Public Key\": \"-----BEGIN P > > UBLIC > > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6Ia > J8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvS > zxL48\\nAI+NcJg > > > > Laa5aV+B9xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+\\ > npS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\ > nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9 > > > > NgBWLGNfndRWaSVjF6flFn2feylfJgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+ > 8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/ > RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh > > > > 3KSkUeyQh\\nU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHA > Tq5m89J4to6UoBjugWWrRpQXsOBm98/\\n04dWeKeCZuRNzR+YHugdNUzPds/ > 11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\neNAIdetOQuzr > > > > /EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi8\\ > n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\ > n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n- > > ----END PUBLIC KEY-----\\n\", \"MD5 > > Finger Print\": \"63:69:7F:B6:C5:DB:8D:3A:1B:A3:0A:C4:7B:7E:72:D9\", > > \"SHA1 Finger Print\": \"C1:6E:EB:2F:9C:3F:8F:2E:51:5 > > C:5B:B9:EA:8D:C6:9A:99:2A:C4:92\", \"SHA-256 Finger > > Print\": > > \"22:75:34:23:78:30:65:31:9F:42:4F:DD:62:40:EE:7C:08:6E:89: > BD:AE:F8:50:B4:09:F4:75:FE:BB:94:CB:C5 > > \", \"Serial Number\": > > \"70:1A:5D:73:54:F5:98:12\", \"Version\": 3, \"Key Size\": 4096, > > \"X509v3 Extensions\": {\"subjectKeyIdentifier\": \"15:A9:34:9A:0C:C6: > > > > 72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", \"keyUsage\": \"critical > > Key Encipherment\", \"authorityKeyIdentifier\": > > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45 > > :1A:51:47:45:3F:4D:9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari. > mahadevan at pfizer.com/SN=None\\nserial > > > > :F1:3D:64:29:EA:09:37:80\\n\", \"basicConstraints\": > > \"critical CA:FALSE\"}, \"Subject\": {\"C\": \"US\", > > \"organizationName\": \"Pfizer\", \"CN\": \"null-005 > > 0568c7c69.pfizer.com \", > > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > > \"hari.mahadevan at pfizer.com \", > > \"GN\": \"None\", \"surname\": \"None\", \"OU > > \": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not Before\": > > \"2017-04-18 13:57:04\", \"Issuer\": {\"C\": \"US\", > > \"organizationName\": \"Pfizer\", \"CN\": > > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > > \"emailAddress\": \"hari.mahadevan at pfizer.com > > \", \"GN\": \"None\", \"surname\": > > \"None\", \"OU\": \" BTI\"}}, > > \"retcode\": 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": > > \"2017-04-18T13:57:04.783393\", \"fun\": > > \"x509.sign_remote_certificate\", \"id\ > > ": > > \"ca\"}","alter_time":"2017-04-18T13:57:04.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:57:06.000Z","processed_at":"2017- > > > > 04-18T13:57:06.000Z","worker_id":"worker1"},{"id":66,"tag": > "20170418135705080506","data":"{\"_stamp\": > > \"2017-04-18T13:57:05.080798\", \"minions\": [\"ca\"]}" > > > > ,"alter_time":"2017-04-18T13:57:05.000Z","master_id":" > ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:57:06.000Z","processed_at":"2017-04-18T13:57 > > > > :06.000Z","worker_id":"worker1"},{"id":67,"tag":" > salt/job/20170418135705080506/new","data":"{\"tgt_type\": > > \"glob\", \"jid\": \"20170418135705080506\", \"tgt\ > > ": \"ca\", \"_stamp\": \"2017-04-18T13:57:05.081172\", > > \"user\": \"root\", \"arg\": [{\"signing_policy\": \"minion\", > > \"public_key\": \"-----BEGIN PUBLIC KEY- > > ----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ > 8FZv65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0Z > uvSzxL48AI+NcJgLaa5aV+B9xoiq5uME4X > > > > DcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+pS0GYvYXOptF/ > x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3CaZhM6v3l > tegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2fe > > > > ylfJgeBF2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/ > B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 > KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8 > > > > hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/ > 11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPDeNAIdetOQuzr/ > EEBBSfg+dPdedIOWBZMAZyRkH+Rna6PwkxXJP8n > > > > Xt8NM3yH1Hi809LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi0 > 0V1TpH6MWvl+Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": > > \"null-0050568c7c69.pfizer.com > > \", \"L\": \"Pearl River\", \"O\": > > \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, \"keyUsage\": > > \"nonRepudiation, digitalSign ature, > > keyEncipherment\", \"SN\": \"None\", \"public_key_passphrase\": > > \"None\", \"GN\": \"None\", \"OU\": \"BTI\", \"Email\": > > \"hari.mahadevan at pfizer.com \", > > \"basicConstraints\": \"critical > > CA:false\"}], \"fun\": \"x509.sign_remote_certificate\", \"minions\": > > [\"ca\"]}","alter_time":"2017-04-18T13:57:05.000Z","mas > > > > ter_id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:57:06.000Z","processed_at":"2017-04-18T13: > 57:06.000Z","worker_id":"worker1"},{"id":68,"ta > > > > g":"salt/job/20170418135705080506/ret/ca","data":"{\"fun_args\": > > [{\"signing_policy\": \"minion\", \"public_key\": \"-----BEGIN PUBLIC > > KEY-----MIICIjANBgkqhki > > G9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv65O7b6IjycW > fkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvSzxL48AI+NcJgLaa5aV+ > B9xoiq5uME4XDcotDwNRnqt+JfVSeHP > > > > d0HcA5agSIhG93Bp7H+pS0GYvYXOptF/x4jjd29jJ1nZEhuN4RvPTK2D1xnND+ > capMnXXAoIypQg7Wozml3CaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNf > ndRWaSVjF6flFn2feylfJgeBF2k0JK9TfyG0 > > > > 1ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/ > B9vqiZGn4UntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 > KSkUeyQhU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4 > > > > to6UoBjugWWrRpQXsOBm98/04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/ > PjikFzLYLQMzuQcPDeNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+ > Rna6PwkxXJP8nXt8NM3yH1Hi809LUFhh > > > > yuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+ > Zomx9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==-----END > > PUBLIC KEY-----\", \"C\": \"US\", \"CN\": \"null-0050568c7c6 > > 9.pfizer.com \", \"L\": > > \"Pearl River\", \"O\": \"Pfizer\", \"ST\": \"NY\", \"days_valid\": 100, > > \"keyUsage\": \"nonRepudiation, digitalSignature, keyEncipherm > > ent\", \"SN\": \"None\", > > \"public_key_passphrase\": \"None\", \"GN\": \"None\", \"OU\": \"BTI\", > > \"Email\": \"hari.mahadevan at pfizer.com > > \", \"basicConstraints\ > > ": \"critical CA:false\"}], \"jid\": > > \"20170418135705080506\", \"return\": \"-----BEGIN > > CERTIFICATE-----\\nMIIHFzCCBP+gAwIBAgIIJbV/iVovLrEwDQYJKoZIhvcNAQELBQA > > > > wga0xCzAJBgNV\\nBAYTAlVTMRQwEgYDVQQDDAtsb2Nhb > GRvbWFpbjEUMBIGA1UEBwwLUGVhcmwgUml2\\nZXIxCzAJBgNVBAgMAk5ZMQ8wDQYDV > QQKDAZQZml6ZXIxDTALBgNVBCoMBE5vbmUx\\nDDAKBgNV > > > > BAsMA0JUSTEoMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2YW5AcGZp\\ > nemVyLmNvbTENMAsGA1UEBAwETm9uZTAeFw0xNzA0MTgxMzU3MDVaFw0xNzA > 3Mjcx\\nMzU3MDVaMIG+MQswCQYDVQQGEwJVUzEl > > > > MCMGA1UEAwwcbnVsbC0wMDUwNTY4Yzdj\\nNjkucGZpemVyLmNvbTEUMBIGA1UEB > wwLUGVhcmwgUml2ZXIxCzAJBgNVBAgMAk5Z\\nMQ8wDQYDVQQKDAZQZml6ZXIxDTALB > gNVBCoMBE5vbmUxDDAKBgNVBAsM > > > > A0JUSTEo\\nMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2YW5AcGZpemVyLmNvbTENMAs > GA1UE\\nBAwETm9uZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALCcIkL > w9p8h\\nj+iGifBWb+uTu > > > > 2+iI8nFn5Ft2Sra2lQpRUshGfefKl0idZ1FZnWL7igIhpl3lE4t\\nGbr0s8S+ > PACPjXCYC2muWlfgfcaIqubjBOFw3KLQ8DUZ6rfiX1Unhz3dB3AOWoEi\\nIRvdwaex/ > qUtBmL2FzqbRf8eI43dvYydZ2RIb > > > > jeEbz0ytg9cZzQ/nGqTJ11wKCMq\\nUIO1qM5pdwmmYTOr95bXoCgDjJrtm2UIq2a75vG/ > TYAVixjX53UVmklYxen5RZ9n\\n3spXyYHgRdpNCSvU38htNREfPp+ > HBHVIfvM8xikt20RqwZ7zTvQNxlmkeD4hi > > > > /wf\\nb6omRp+FJ7bJIkM/YwdapUo6jWu8Prkq8nv0Y8bAKTcSyy > vDqOE7OS0gWLFSfMgo\\ndykpFHskIVOf4iduncshA8J28+ntZcvIUS+ > sqKH0RwE6uZvPSeLaOlKAY7oFlq0a\\nUF7DgZvfP9OHVningm > > > > bkTc0fmB7oHTVMz3bP9dVxb7lfM4sb0r1nLU5vz44pBcy2\\nC0DM7kHDw3jQCHXrTkLs6/ > xBAQUn4PnT3XnSDlgWTAGckZB/kZ2uj8JMVyT/J17f\\nDTN8h9R4vNPS1BYYcrl3IvD0MxL1R > HH6S6KdGveRiR > > > > 5zYNtcbVKFu1cYtNFdU6R+\\njFr5fmaJsfcvAkIERrib1qp697tw0 > 149AgMBAAGjggEmMIIBIjAMBgNVHRMBAf8E\\nAjAAMA4GA1UdDwEB/ > wQEAwIFIDAdBgNVHQ4EFgQUFak0mgzGcqg0vtmHK1RMEU9f\\ > > > > nJZswgeIGA1UdIwSB2jCB14AUUXOQQ1B/irubQkUaUUdFP02fXJmhgbOkgbAwga0x\\ > nCzAJBgNVBAYTAlVTMRQwEgYDVQQDDAtsb2NhbGRvbWFpbjEUMBIGA1UEBwwLUGVh\\ > ncmwgUml2ZXIxCzAJBgNVBAg > > > > MAk5ZMQ8wDQYDVQQKDAZQZml6ZXIxDTALBgNVBCoM\\ > nBE5vbmUxDDAKBgNVBAsMA0JUSTEoMCYGCSqGSIb3DQEJARYZaGFyaS5tYWhhZGV2\\ > nYW5AcGZpemVyLmNvbTENMAsGA1UEBAwETm9uZYIJAPE9ZCn > > > > qCTeAMA0GCSqGSIb3\\nDQEBCwUAA4ICAQBsesVZM1ATYgejY/OdqyLoS69/ > Fza7G1PLY8cq22Y7u4DrLg01\\nCGyqaXis+hdKPUpCY7lkmL+ > Mdiy3oL5T7NigXODHtjLpCuyplVpXqvQlQuqNW8ph\\nkNqU > > > > VS54+N5vfbTmY8pAHRbvvVHBakFfpWrrtTtgWEj1v9e1a79NkchVbPKmSI+z\\ > nnv4gxZmuOVc24Ci10PGNfIue01cFR0ZGHBGns/8RfJvo32s0NvkM3GPy/kqkkMtX\\ > n8O2tp4YJKoh3sSZzQb8mhoxKL9IM > > > > yiNwHYPSiySHSDplyFk+g9TlVyjrpV30s8CP\\nvtV0TtY3ZsdVMECI/ > tp8tSHvOjoYxYiio8aXCwoGNFbD5IADk9KhPVkJN3O/Cd7n\\ > nypg04MP7MWmmrH9tcIbyshUgn11v/3SER5WZ9V1HDh6wRFzajByn > > > > K0wFHwG3fzTz\\nuYizwEB2nQNt3adNvZLbxsRRviFFp > dipXFP6E1uwkj0Hcrgiz298rsqqu+5iAUuc\\nZgED519/ > cCQNevVWphnH7tHLenkXahRZerBG78YxHNehpuykGu1XHPoQMGWWmCE0\\ndlkxg/1HT > > > > yy/HJSDImsYd25J9NsCBo3/OibwQTFSx59jkC1FcHq5pNLEAX+b178Q\\ > niP0nMLxqobG11dcErKZkwDsW7zEJTxHy62/V11vlVC5h8Kmuxh+JGCgTgg==\\n-----END > > CERTIFICATE-----\\n\", \"ret code\": 0, > > \"success\": true, \"cmd\": \"_return\", \"_stamp\": > > \"2017-04-18T13:57:05.178683\", \"fun\": > > \"x509.sign_remote_certificate\", \"id\": \"ca\"}","a > > > > lter_time":"2017-04-18T13:57:05.000Z","master_id":" > ppklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:57:06.000Z","processed_at":"2017-04-18T13:57:06 > > > > .000Z","worker_id":"worker1"},{"id":69,"tag":"salt/job/ > 20170418135657522690/ret/null-0050568c7c69.pfizer.com > > ","data":"{\"fun_args\": > > [\"repositories,etcd-prox y\", > > {\"queue\": false, \"concurrent\": true, \"saltenv\": \"base\"}], > > \"jid\": \"20170418135657522690\", \"return\": > > {\"file_|-/etc/pki/trust/anchors/SUSE_Ca > > aSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": > > {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists > > with proper permission s. No changes > > made.\", \"pchanges\": {}, \"name\": > > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > > \"13:57:02.868940\", \"result\": true, \"dura > > tion\": 0.844, \"__run_num__\": 5, \"changes\": {}, \"__id__\": > > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > > \"user_|-etcd_|-etcd_|-present\": {\"comment\": > > \"User etcd is present and up to date\", \"name\": \"etcd\", > > \"start_time\": \"13:57:05.450830\", \"result\": true, \"duration\": > > 1.177, \"__run_num__\": 11, > > \"changes\": {}, \"__id__\": \"etcd\"}, > > \"iptables_|-etcd_|-etcd_|-append\": {\"comment\": \"Set iptables rule > > for etcd to: /usr/sbin/iptables --wait -t filt > > er -A INPUT -p tcp -m state --state NEW -m multiport --dports > > 2379,2380,4001 --jump ACCEPT for ipv4\", \"name\": \"etcd\", > > \"start_time\": \"13:57:05.500990\ ", > > \"result\": true, \"duration\": 103.789, \"__run_num__\": 14, > > \"changes\": {\"locale\": \"etcd\"}, \"__id__\": \"etcd\"}, > > \"group_|-etcd_|-etcd_|-present\" : > > {\"comment\": \"Group etcd is present and up to date\", \"name\": > > \"etcd\", \"start_time\": \"13:57:05.446135\", \"result\": true, > > \"duration\": 0.478, \"__ run_num__\": > > 10, \"changes\": {}, \"__id__\": \"etcd\"}, > > \"file_|-etcd_|-/var/lib/etcd_|-directory\": {\"comment\": \"Directory > > /var/lib/etcd updated\", \"pch anges\": > > {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, \"name\": \"/var/lib/etcd\", > > \"start_time\": \"13:57:05.452433\", \"result\": true, \"duration\": > > 1.332, \ "__run_num__\": 12, > > \"changes\": {\"mode\": \"0700\"}, \"__id__\": \"etcd\"}, > > \"file_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": > > {\"comment\": \" File > > /etc/pki/minion.key exists with proper permissions. No changes made.\", > > \"pchanges\": {}, \"name\": \"/etc/pki/minion.key\", \"start_time\": > > \"13:57:04.6 75638\", \"result\": true, > > \"duration\": 0.806, \"__run_num__\": 7, \"changes\": {}, \"__id__\": > > \"/etc/pki/minion.key\"}, \"file_|-/etc/pki/trust/anchors_|-/ > > etc/pki/trust/anchors_|-directory\": > > {\"comment\": \"Directory /etc/pki/trust/anchors is in the correct > > state\", \"pchanges\": {}, \"name\": \"/etc/pki/trust/ > > anchors\", \"start_time\": \"13:57:02.841138\", > > \"result\": true, \"duration\": 0.957, \"__run_num__\": 3, \"changes\": > > {}, \"__id__\": \"/etc/pki/trust/ancho > > rs\"}, \"file_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-managed\": > > {\"comment\": \"File /etc/pki/minion.crt exists with proper permissions. > > No changes mad e.\", \"pchanges\": {}, > > \"name\": \"/etc/pki/minion.crt\", \"start_time\": \"13:57:05.443918\", > > \"result\": true, \"duration\": 0.834, \"__run_num__\": 9, \"c > > hanges\": {}, \"__id__\": > > \"/etc/pki/minion.crt\"}, > > \"x509_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/ > etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed > > \": {\"comment\": \"File > > /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt updated\", \"pchanges\": {}, > > \"name\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start > > _time\": \"13:57:02.865531\", \"result\": true, > > \"duration\": 3.272, \"__run_num__\": 4, \"changes\": {\"diff\": \"New > > file\"}, \"__id__\": \"/etc/pki/trust/a > > nchors/SUSE_CaaSP_CA.crt\"}, > > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ > repos.d/containers.repo_|-managed\": > > {\"comment\": \"File /etc/zypp/repos. > > d/containers.repo updated\", \"pchanges\": {}, \"name\": > > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > > \"13:56:58.408694\", \"result\": true, \"durat > > ion\": 153.355, \"__run_num__\": 0, \"changes\": {\"diff\": \"New > > file\", \"mode\": \"0644\"}, \"__id__\": > > \"/etc/zypp/repos.d/containers.repo\"}, \"pkg_|-pyt > > hon-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": > > \"Package python-M2Crypto is already installed\", \"name\": > > \"python-M2Crypto\", \"start_time\": \ > > "13:57:02.340920\", \"result\": true, \"duration\": 498.795, > > \"__run_num__\": 1, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, > > \"pkg_|-etcd_|-etcd_|-inst alled\": > > {\"comment\": \"All specified packages are already installed\", > > \"name\": \"etcd\", \"start_time\": \"13:57:05.454362\", \"result\": > > true, \"duration \": 13.399, > > \"__run_num__\": 13, \"changes\": {}, \"__id__\": \"etcd\"}, > > \"file_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-/ > etc/systemd/system/etcd.serv > > ice.d/etcd.conf_|-managed\": > > {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf > > updated\", \"pchanges\": {}, \"name\": \"/etc/systemd/system/et > > cd.service.d/etcd.conf\", \"start_time\": > > \"13:57:07.212834\", \"result\": true, \"duration\": 71.567, > > \"__run_num__\": 18, \"changes\": {\"diff\": \"New file > > \", \"mode\": \"0644\"}, \"__id__\": > > \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, > > \"file_|-/etc/sysconfig/etcd_|-/etc/sysconfig/etcd_|-managed\": {\"com > > ment\": \"File /etc/sysconfig/etcd > > updated\", \"pchanges\": {}, \"name\": \"/etc/sysconfig/etcd\", > > \"start_time\": \"13:57:05.605471\", \"result\": true, \"du > > ration\": 83.655, \"__run_num__\": 15, \"changes\": > > {\"diff\": \"--- \\n+++ \\n@@ -1,47 +1,30 @@\\n-# > > [member]\\n-ETCD_NAME=default\\n-ETCD_DATA_DIR=\\\"/var/ > > > > lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-# > ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_ > INTERVAL=\\\"100\\\"\\n-#ETCD_ELECTION_TIMEOUT=\\ > > > > \"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380 > \\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\"http://localhost:2379\\\"\\n-#ETCD_ > MAX_SNAPSHOTS=\\\"5\\\"\\ > > > > n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[ > cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"http://localhost:2380 > \\\"\\n-# > > if you use differ ent ETCD_NAME (e.g. > > test), set ETCD_INITIAL_CLUSTER value for this name, i.e. > > \\\"test=http://...\\\"\\n-#ETCD_INITIAL_CLUSTER=\\\"default= > http://localhost:23 > > > > 80\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-# > ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ > ADVERTISE_CLIENT_URLS=\\\"http://localhost:2379\ > > > > \\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\ > \\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-# > ETCD_DISCOVERY_PROXY=\\\"\\\"\\n-#\\n-#[proxy]\\ > > > > n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\" > 5000\\\"\\n-#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\" > \\n-#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n-# > > > > ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_ > TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FILE=\ > \\"\\\"\\n-#ETCD_KEY_FILE=\\\"\\\"\\n-#ETC > > > > D_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\ > \"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER_ > KEY_FILE=\\\"\\\"\\n-#ETCD_PEER_CLIENT_CERT_ > > > > AUTH=\\\"false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\ > \n-#\\n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# > > examples for -log-package-levels etcdserver=WAR > > NING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_LEVELS=\\\"\\\"\\n+# > > etcd proxy configuration\\n+# see > > https://coreos.com/etcd/docs/latest/op-guide/configuration.htm > > > > l\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\" > null-0050568c7c69.pfizer.com > > \\\"\\n+\\n+ETCD_ > LISTEN_CLIENT_URLS=\\\"http://0.0.0.0:2379\\\"\\n+ > > > > ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380\\\"\\n+\\n+ > ETCD_ADVERTISE_CLIENT_URLS=\\\"http://null-0050568c7c69.pfizer.com:2379, > http://10.34.246.88:2379\\\" > > > > \\n+\\n+ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA. > crt\\n+ETCD_CERT_FILE=/etc/pki/minion.crt\\n+ETCD_KEY_ > FILE=/etc/pki/minion.key\\n+ETCD_TRUSTED_CA_FI > > > > LE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+\\n+ETCD_ > PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+ > ETCD_PEER_CERT_FILE=/etc/pki/minion.crt\\n+ET > > > > CD_PEER_KEY_FILE=/etc/pki/minion.key\\n+ETCD_PEER_ > TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# > > ETCD_PEER_CLIENT_CERT_AUTH=on\\n+# ETCD_PEER_A > > UTO_TLS=on\\n+\\n+# > > discovery\\n+ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer. > com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_ > DISCOVERY_FALLBACK=\\\"proxy\\ > > > > \"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n+ > ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"https://null- > 0050568c7c69.pfizer.com:2380,https://10.34.246.88:2380\\ > > > > \"\\n+ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n\", \"group\": \"etcd\", > > \"user\": \"etcd\"}, \"__id__\": \"/etc/sysconfig/etcd\"}, > > \"x509_|-/etc/pki/minion.cr > > t_|-/etc/pki/minion.crt_|-certificate_managed\": {\"comment\": > > \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, \"name\": > > \"/etc/pki/minion.crt\", \"st > > art_time\": \"13:57:04.676856\", \"result\": true, \"duration\": > > 766.905, \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": > > {\"Not After\": \"2017- 07-27 > > 13:57:05\", \"X509v3 Extensions\": {\"subjectKeyIdentifier\": > > \"15:A9:34:9A:0C:C6:72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", > > \"keyUsage\": \"critical Key > > Encipherment\", \"authorityKeyIdentifier\": > > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D: > 9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > > Riv > > er/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari. > mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > > 29:EA:09:37:80\\n\>", > > \"basicConstraints\": \"critical CA:FAL > > SE\"}, \"Subject Hash\": \"0F:F8:79:4C\", \"MD5 Finger Print\": > > \"72:69:54:30:5F:7D:BD:F7:6B:14:8C:6B:90:DD:8D:D2\", \"SHA1 Finger > > Print\": \"1F:2B:E1:94:FA:E > > F:F4:4C:43:D1:5B:E9:8C:2D:5C:3F:46:99:70:DD\", \"SHA-256 Finger > > Print\": > > \"D2:F8:80:38:D9:D5:1C:C0:EC:9A:3E:5A:34:C2:F8:22:36:E5:DB: > C0:F3:E8:E3:7A:1D:60:96:5F > > :FD:23:FD:5E\", \"Serial Number\": > > \"25:B5:7F:89:5A:2F:2E:B1\", \"Version\": 3, \"Key Size\": 4096, > > \"Public Key\": \"-----BEGIN PUBLIC KEY-----\\nMIICIjANBgk > > > > qhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6IaJ8FZv\\ > n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvS > zxL48\\nAI+NcJgLaa5aV+B9xoiq5uME4XDcotDwNRn > > > > qt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/ > x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\ > nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfndRWaSVjF6flFn2feylf > > > > JgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+8zzGKS3bRGrBnvNO9A3GWaR4PiGL/ > B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3 > KSkUeyQh\\nU5/iJ26dyyEDwnbz > > > > 6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98/\\ > n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\ > neNAIdetOQuzr/EEBBSfg+dPdedIOWBZMAZyRkH+R > > > > na6PwkxXJP8nXt8NM3yH1Hi8\\n09LUFhhyuXci8PQzEvVEcfpLop0a9 > 5GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\n9y8CQgRGuJvWqnr3u3DTXj0CAwEAA > Q==\\n-----END > > PUBLIC KEY-----\\n\" , \"Subject\": > > {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > > \"null-0050568c7c69.pfizer.com \", > > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddr > > ess\": \"hari.mahadevan at pfizer.com > > \", \"GN\": \"None\", \"surname\": > > \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > > Before\": \"2017-04-1 8 13:57:05\", > > \"Issuer\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > > \"emailAddress\": > > \"hari.mahadevan at pfizer.com \", > > \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": > > \"/etc/pki/minion.crt does not exist.\"}}, \"__id__\": \" > > /etc/pki/minion.crt\"}, > > \"file_|-/etc/pki_|-/etc/pki_|-directory\": {\"comment\": \"Directory > > /etc/pki is in the correct state\", \"pchanges\": {}, \"name\": > > \"/etc/pki\", \"start_time\": > > \"13:57:02.839911\", \"result\": true, \"duration\": 1.089, > > \"__run_num__\": 2, \"changes\": {}, \"__id__\": \"/etc/pki\"}, \"cm > > d_|-etcd_|-rm -rf /var/lib/etcd/*_|-run\": > > {\"comment\": \"Command \\\"rm -rf /var/lib/etcd/*\\\" run\", \"name\": > > \"rm -rf /var/lib/etcd/*\", \"start_time\": > > \"13:57:05.737534\", \"result\": true, \"duration\": 8.905, > > \"__run_num__\": 16, \"changes\": {\"pid\": 3150, \"retcode\": 0, > > \"stderr\": \"\", \"stdout\": \ "\"}, > > \"__id__\": \"etcd\"}, \"service_|-etcd_|-etcd_|-running\": > > {\"comment\": \"Service etcd has been enabled, and is running\", > > \"name\": \"etcd\", \"start _time\": > > \"13:57:05.747520\", \"__id__\": \"etcd\", \"duration\": 1465.078, > > \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"result\": true}, > > \"x509_|-/e > > tc/pki/minion.key_|-/etc/pki/minion.key_|-private_key_managed\": > > {\"comment\": \"File /etc/pki/minion.key updated\", \"pchanges\": {}, > > \"name\": \"/etc/pki/mi nion.key\", > > \"start_time\": \"13:57:02.870325\", \"result\": true, \"duration\": > > 1805.146, \"__run_num__\": 6, \"changes\": \"New private key > > generated\", \"_ _id__\": > > \"/etc/pki/minion.key\"}}, \"retcode\": 0, \"success\": true, \"cmd\": > > \"_return\", \"_stamp\": \"2017-04-18T13:57:07.292911\", \"fun\": > > \"state.sls\ ", \"id\": > > \"null-0050568c7c69.pfizer.com \", > > \"out\": > > \"highstate\"}","alter_time":"2017-04-18T13:57:07.000Z"," > master_id":"ppklablinux30.localdomain_master"," > > > > taken_at":"2017-04-18T13:57:11.000Z","processed_at":"2017- > 04-18T13:57:11.000Z","worker_id":"worker1"},{"id":70,"tag": > "20170418135712692212","data":"{\"_stamp\ > > ": \"2017-04-18T13:57:12.692634\", > > \"minions\": [\"ppklablinux31\", \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:12.000Z","master_id":"p > > > > pklablinux30.localdomain_master","taken_at":"2017-04- > 18T13:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z" > ,"worker_id":"worker1"},{"id":71,"tag":"salt/j > > > > ob/20170418135712692212/new","data":"{\"tgt_type\": \"list\", \"jid\": > > \"20170418135712692212\", \"tgt\": [\"ppklablinux31\", > > \"null-0050568303b8.pfizer.com \" > > ], \"_stamp\": > > \"2017-04-18T13:57:12.693191\", \"user\": \"root\", \"arg\": > > [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\", \"minions\": > > [\"ppklab linux31\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:12.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T1 > > > > 3:57:16.000Z","processed_at":"2017-04-18T13:57:16.000Z"," > worker_id":"worker1"},{"id":72,"tag":"salt/job/20170418135712692212/ret/ > ppklablinux31","data":"{\"fun > > _args\": [\"20170418135657522690\"], > > \"jid\": \"20170418135712692212\", \"return\": {\"tgt_type\": > > \"grain_pcre\", \"jid\": \"20170418135657522690\", \"tgt\": > > \"roles:kube-(master|minion)\", \"pid\": 3261, > > \"ret\": \"\", \"user\": \"root\", \"arg\": > > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": t > > rue, \"saltenv\": \"base\", \"__kwarg__\": > > true}], \"fun\": \"state.sls\"}, \"retcode\": 0, \"success\": true, > > \"cmd\": \"_return\", \"_stamp\": \"2017-04-18T > > 13:57:12.743983\", \"fun\": \"saltutil.find_job\", \"id\": > > \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:12. > 000Z","master_id":"ppklablinux30.localdomain_ > > > > master","taken_at":"2017-04-18T13:57:16.000Z","processed_ > at":"2017-04-18T13:57:16.000Z","worker_id":"worker1"},{"id":73,"tag":" > 20170418135722886110","data":"{ > > \"_stamp\": > > \"2017-04-18T13:57:22.886424\", \"minions\": [\"ppklablinux31\", > > \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:22.000Z","mast > > > > er_id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:57:26.000Z","processed_at":"2017-04-18T13: > 57:26.000Z","worker_id":"worker1"},{"id":74,"tag > > > > ":"salt/job/20170418135722886110/new","data":"{\"tgt_type\": \"list\", > > \"jid\": \"20170418135722886110\", \"tgt\": [\"ppklablinux31\", > > \"null-0050568303b8.pfi zer.com > > \"], \"_stamp\": \"2017-04-18T13:57:22.886820\", > > \"user\": \"root\", \"arg\": [\"20170418135657522690\"], \"fun\": > > \"saltutil.find_job\", \"minions\": > > [\"ppklablinux31\", \"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:22.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"201 > > > > 7-04-18T13:57:26.000Z","processed_at":"2017-04-18T13: > 57:26.000Z","worker_id":"worker1"},{"id":75,"tag":" > salt/job/20170418135722886110/ret/ppklablinux31","data > > ":"{\"fun_args\": > > [\"20170418135657522690\"], \"jid\": \"20170418135722886110\", > > \"return\": {\"tgt_type\": \"grain_pcre\", \"jid\": > > \"20170418135657522690\", \"tgt\": > > \"roles:kube-(master|minion)\", \"pid\": 3261, \"ret\": \"\", \"user\": > > \"root\", \"arg\": [\"repositories,etcd-proxy\", {\"queue\": false, > > \"concur rent\": true, \"saltenv\": > > \"base\", \"__kwarg__\": true}], \"fun\": \"state.sls\"}, \"retcode\": > > 0, \"success\": true, \"cmd\": \"_return\", \"_stamp\": \"20 > > 17-04-18T13:57:22.934015\", \"fun\": > > \"saltutil.find_job\", \"id\": > > \"ppklablinux31\"}","alter_time":"2017-04-18T13:57:22. > 000Z","master_id":"ppklablinux30.loc > > > > aldomain_master","taken_at":"2017-04-18T13:57:26.000Z"," > processed_at":"2017-04-18T13:57:26.000Z","worker_id":" > worker1"},{"id":76,"tag":"salt/job/2017041813565 > > > > 7522690/ret/ppklablinux31","data":"{\"fun_args\": > > [\"repositories,etcd-proxy\", {\"queue\": false, \"concurrent\": true, > > \"saltenv\": \"base\"}], \"jid\": \"2 > > 0170418135657522690\", \"return\": > > {\"file_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/ > etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": > > {\"comment\": \" File > > /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with proper permissions. > > No changes made.\", \"pchanges\": {}, \"name\": > > \"/etc/pki/trust/anchors/SUSE_Ca > > aSP_CA.crt\", \"start_time\": \"13:56:59.209683\", \"result\": true, > > \"duration\": 0.895, \"__run_num__\": 5, \"changes\": {}, \"__id__\": > > \"/etc/pki/trust/an > > chors/SUSE_CaaSP_CA.crt\"}, \"user_|-etcd_|-etcd_|-present\": > > {\"comment\": \"User etcd is present and up to date\", \"name\": > > \"etcd\", \"start_time\": \"13: > > 57:01.166178\", \"result\": true, \"duration\": 1.237, \"__run_num__\": > > 11, \"changes\": {}, \"__id__\": \"etcd\"}, > > \"iptables_|-etcd_|-etcd_|-append\": {\"co > > mment\": \"Set iptables rule for etcd to: /usr/sbin/iptables --wait > > -t filter -A INPUT -p tcp -m state --state NEW -m multiport --dports > > 2379,2380,4001 --jum p ACCEPT for > > ipv4\", \"name\": \"etcd\", \"start_time\": \"13:57:01.186448\", > > \"result\": true, \"duration\": 82.853, \"__run_num__\": 14, > > \"changes\": {\"loc ale\": \"etcd\"}, > > \"__id__\": \"etcd\"}, \"group_|-etcd_|-etcd_|-present\": {\"comment\": > > \"Group etcd is present and up to date\", \"name\": \"etcd\", \"star > > t_time\": \"13:57:01.164678\", \"result\": > > true, \"duration\": 0.482, \"__run_num__\": 10, \"changes\": {}, > > \"__id__\": \"etcd\"}, \"file_|-etcd_|-/var/lib/et > > cd_|-directory\": {\"comment\": \"Directory /var/lib/etcd > > updated\", \"pchanges\": {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, > > \"name\": \"/var/lib/etcd\", \"s > > tart_time\": \"13:57:01.167829\", \"result\": true, \"duration\": > > 1.373, \"__run_num__\": 12, \"changes\": {\"mode\": \"0700\"}, > > \"__id__\": \"etcd\"}, \"file > > _|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": {\"comment\": > > \"File /etc/pki/minion.key exists with proper permissions. No changes > > made.\", \"pchan ges\": {}, \"name\": > > \"/etc/pki/minion.key\", \"start_time\": \"13:57:00.377681\", > > \"result\": true, \"duration\": 0.889, \"__run_num__\": 7, \"changes\": > > {}, \"__id__\": > > \"/etc/pki/minion.key\"}, > > \"file_|-/etc/pki/trust/anchors_|-/etc/pki/trust/anchors_|-directory\": > > {\"comment\": \"Directory /etc/pki/trust/anchor > > s is in the correct state\", \"pchanges\": {}, \"name\": > > \"/etc/pki/trust/anchors\", \"start_time\": \"13:56:59.203831\", > > \"result\": true, \"duration\": 0.98 9, > > \"__run_num__\": 3, \"changes\": {}, \"__id__\": > > \"/etc/pki/trust/anchors\"}, > > \"file_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-managed\": > > {\"comment\": \"File > > /etc/pki/minion.crt exists with proper permissions. No changes made.\", > > \"pchanges\": {}, \"name\": \"/etc/pki/minion.crt\", \"start_time\": > > \"13:57:0 1.163388\", \"result\": true, > > \"duration\": 0.834, \"__run_num__\": 9, \"changes\": {}, \"__id__\": > > \"/etc/pki/minion.crt\"}, \"x509_|-/etc/pki/trust/anchors/ > > > > SUSE_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA. > crt_|-pem_managed\": > > {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt updated\", > > \"pchan ges\": {}, \"name\": > > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > > \"13:56:59.205883\", \"result\": true, \"duration\": 3.666, > > \"__run_num__\" : 4, \"changes\": > > {\"diff\": \"New file\"}, \"__id__\": > > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ > > repos.d/containers.repo_|-managed\": {\"comment\": > > \"File /etc/zypp/repos.d/containers.repo is in the correct state\", > > \"pchanges\": {}, \"name\": \"/etc/zypp > > /repos.d/containers.repo\", \"start_time\": \"13:56:58.373899\", > > \"result\": true, \"duration\": 59.059, \"__run_num__\": 0, \"changes\": > > {}, \"__id__\": \"/e > > tc/zypp/repos.d/containers.repo\"}, > > \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": > > \"Package python-M2Crypto is already installed\", \ > > "name\": \"python-M2Crypto\", \"start_time\": > > \"13:56:58.963258\", \"result\": true, \"duration\": 239.098, > > \"__run_num__\": 1, \"changes\": {}, \"__id__\": \ > > "python-M2Crypto\"}, \"pkg_|-etcd_|-etcd_|-installed\": > > {\"comment\": \"All specified packages are already installed\", > > \"name\": \"etcd\", \"start_time\": \" > > 13:57:01.169779\", \"result\": true, \"duration\": 13.51, > > \"__run_num__\": 13, \"changes\": {}, \"__id__\": \"etcd\"}, > > \"file_|-/etc/systemd/system/etcd.servi > > ce.d/etcd.conf_|-/etc/systemd/system/etcd.service.d/etcd. > conf_|-managed\": > > {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf > > updated\", \"pcha nges\": {}, \"name\": > > \"/etc/systemd/system/etcd.service.d/etcd.conf\", \"start_time\": > > \"13:57:31.962373\", \"result\": true, \"duration\": 71.157, \"__run_n > > um__\": 18, \"changes\": {\"diff\": \"New > > file\", \"mode\": \"0644\"}, \"__id__\": > > \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, > > \"file_|-/etc/sysconfig/ > > etcd_|-/etc/sysconfig/etcd_|-managed\": {\"comment\": \"File > > /etc/sysconfig/etcd updated\", \"pchanges\": {}, \"name\": > > \"/etc/sysconfig/etcd\", \"start_time\ > > ": \"13:57:01.269992\", \"result\": true, \"duration\": 83.05, > > \"__run_num__\": 15, \"changes\": {\"diff\": \"--- \\n+++ \\n@@ -1,47 > > +1,30 @@\\n-# [member]\\n > > -ETCD_NAME=default\\n-ETCD_DATA_DIR=\\\"/var/lib/etcd/ > default.etcd\\\"\\n-#ETCD_WAL_DIR=\\\"\\\"\\n-#ETCD_ > SNAPSHOT_COUNT=\\\"10000\\\"\\n-#ETCD_HEARTBEAT_INTE > > > > RVAL=\\\"100\\\"\\n-#ETCD_ELECTION_TIMEOUT=\\\"1000\\\"\ > \n-#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380\\\"\\n- > ETCD_LISTEN_CLIENT_URLS=\\\"http://localhos > > > > t:2379\\\"\\n-#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\n-#ETCD_ > MAX_WALS=\\\"5\\\"\\n-#ETCD_CORS=\\\"\\\"\\n-#\\n-#[ > cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"htt > > p://localhost:2380\\\"\\n-# if you use > > different ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this > > name, i.e. \\\"test=http://...\\\"\\n-#ETCD_IN > > > > ITIAL_CLUSTER=\\\"default=http://localhost:2380\\\"\\n-# > ETCD_INITIAL_CLUSTER_STATE=\\\"new\\\"\\n-#ETCD_INITIAL_ > CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n-ETCD_ADV > > > > ERTISE_CLIENT_URLS=\\\"http://localhost:2379\\\"\\n-#ETCD_ > DISCOVERY=\\\"\\\"\\n-#ETCD_DISCOVERY_SRV=\\\"\\\"\\n-# > ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n-#ETC > > > > D_DISCOVERY_PROXY=\\\"\\\"\\n-#\\n-#[proxy]\\n-#ETCD_PROXY=\ > \\"off\\\"\\n-#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-# > ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\ > > > > \n-#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n-#ETCD_PROXY_ > WRITE_TIMEOUT=\\\"5000\\\"\\n-#ETCD_PROXY_READ_TIMEOUT=\\\" > 0\\\"\\n-#\\n-#[security]\\n-#ETCD_CERT_FIL > > > > E=\\\"\\\"\\n-#ETCD_KEY_FILE=\\\"\\\"\\n-#ETCD_CLIENT_CERT_ > AUTH=\\\"false\\\"\\n-#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-# > ETCD_PEER_CERT_FILE=\\\"\\\"\\n-#ETCD_PEER > > > > _KEY_FILE=\\\"\\\"\\n-#ETCD_PEER_CLIENT_CERT_AUTH=\\\" > false\\\"\\n-#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n-#\ > \n-#[logging]\\n-#ETCD_DEBUG=\\\"false\\\"\\n-# > > ex amples for -log-package-levels > > etcdserver=WARNING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_ > LEVELS=\\\"\\\"\\n+# > > etcd proxy configuration\\n+# see https://coreos.co > > > > m/etcd/docs/latest/op-guide/configuration.html\\n+\\n+ > ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n+ETCD_NAME=\\\" > ppklablinux31\\\"\\n+\\n+ETCD_LISTEN_CLIENT_URLS=\ > > > > \\"http://0.0.0.0:2379\\\"\\n+ETCD_LISTEN_PEER_URLS=\\\"http > s://0.0.0.0:2380\\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\" > http://ppklablinux31.localdomain:2379,h > > ttp://10.34.246.31:2379 > > \\\"\\n+\\n+ETCD_CA_FILE=/etc/pki/ > trust/anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/ > pki/minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minio > > > > n.key\\n+ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_ > CaaSP_CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/ > anchors/SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FIL > > > > E=/etc/pki/minion.crt\\n+ETCD_PEER_KEY_FILE=/etc/pki/minion. > key\\n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/ > SUSE_CaaSP_CA.crt\\n+# > > ETCD_PEER_CLIENT_CE RT_AUTH=on\\n+# > > ETCD_PEER_AUTO_TLS=on\\n+\\n+# > > discovery\\n+ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer. > com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DIS > > > > COVERY_FALLBACK=\\\"proxy\\\"\\n+\\n+ETCD_INITIAL_CLUSTER_ > TOKEN=\\\"k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" > https://ppklablinux31.localdomain:2380,htt > > ps://10.34.246.31:2380 > > \\\"\\n+ETCD_INITIAL_CLUSTER_ > STATE=\\\"new\\\"\\n\", > > \"group\": \"etcd\", \"user\": \"etcd\"}, \"__id__\": > > \"/etc/sysconfig/etcd\"}, \"x > > 509_|-/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-certificate_managed\": > {\"comment\": > > \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, \"name\": \"/et > > c/pki/minion.crt\", \"start_time\": > > \"13:57:00.378988\", \"result\": true, \"duration\": 784.241, > > \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": > > {\"Not After\": \"2017-07-27 13:57:00\", \"X509v3 > > Extensions\": {\"subjectKeyIdentifier\": > > \"FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\", \ > > "keyUsage\": \"critical Key Encipherment\", > > \"authorityKeyIdentifier\": > > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D: > 9F:5C:99\\nDirName:/C=US/CN > > =localdomain/L=Pearl > > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari. > mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > > 29:EA:09:37:80\\n\>", > > \"basicConstrai nts\": \"critical > > CA:FALSE\"}, \"Subject Hash\": \"03:5E:85:4C\", \"MD5 Finger Print\": > > \"60:B2:03:54:A9:98:50:F6:67:52:DB:CA:EC:99:9E:12\", \"SHA1 Finger Pri > > nt\": > > \"72:E8:0C:33:2D:49:BB:10:A5:53:6B:17:DC:15:1B:E6:BA:FB:7C:FE\", > > \"SHA-256 Finger Print\": > > \"A0:CD:51:FE:5C:8E:F0:B2:AD:40:82:AC:75:0B:85:77:AC:15:E1:76 > > :20:24:22:2B:01:D9:5D:B3:9F:8D:C3:00\", \"Serial > > Number\": \"CB:E0:DD:92:DC:7E:F6:F2\", \"Version\": 3, \"Key Size\": > > 4096, \"Public Key\": \"-----BEGIN PUBLI > > C > > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJ > GjHBE\\nuXGuonX5+UGXOCHk0qj8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1k\\ > nqPU5zMjmeE0 > > > > UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\nStCc2QFH9/ > UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu\\ > n7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp > > > > 0u9+CNpZ2Vc6kHWOk0NUXnrka8KQS\\npYnZeq2Z0//7cfFUVD+ > bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\ > nXqDAVDCcL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/ > > > > fcACG\\nIICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+ > GcqdgL9q/GC0+ncdr+iT0Aply8\\nXp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+ > B43m3RZY3I0njhBqEqEINRZ6T/\\nK/eOWw8LeFK2SQT9 > > > > eIt1neNIkZTlO3LuUPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n/ > FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2\\ > nTt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n----- > > END PUBLIC KEY-----\\n\", \"Subject\": > > {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > > \"ppklablinux31.localdomain\", \"SP\": \"NY\", \"L\": \"Pearl > > River\", \"emailAddress\": > > \"hari.mahadevan at pfizer.com \", > > \"GN\": \"None\", \"surname\": \"None\", \"OU\": \"BTI\"}, \"Issuer > > Hash\": \"2F:0B:83:D6\", \"Not > > Before\": \"2017-04-18 13:57:00\", \"Issuer\": {\"C\": \"US\", > > \"organizationName\": \"Pfizer\", \"CN\": \"localdomain\", \"SP\": > > \"NY\", \"L\": \"Pearl River \", > > \"emailAddress\": \"hari.mahadevan at pfizer.com > > \", \"GN\": \"None\", \"surname\": > > \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/minion.crt does not > > exist .\"}}, \"__id__\": > > \"/etc/pki/minion.crt\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": > > {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchan > > ges\": {}, \"name\": \"/etc/pki\", > > \"start_time\": \"13:56:59.202569\", \"result\": true, \"duration\": > > 1.123, \"__run_num__\": 2, \"changes\": {}, \"__id__\" > > : \"/etc/pki\"}, \"cmd_|-etcd_|-rm -rf > > /var/lib/etcd/*_|-run\": {\"comment\": \"Command \\\"rm -rf > > /var/lib/etcd/*\\\" run\", \"name\": \"rm -rf /var/lib/etcd > > /*\", \"start_time\": \"13:57:01.391652\", > > \"result\": true, \"duration\": 8.113, \"__run_num__\": 16, \"changes\": > > {\"pid\": 3293, \"retcode\": 0, \"stderr\" > > : \"\", \"stdout\": \"\"}, \"__id__\": \"etcd\"}, > > \"service_|-etcd_|-etcd_|-running\": {\"comment\": \"Service etcd has > > been enabled, and is dead\", \"name\": > > \"etcd\", \"start_time\": \"13:57:01.400864\", \"__id__\": \"etcd\", > > \"duration\": 30561.242, \"__run_num__\": 17, \"changes\": {\"etcd\": > > true}, \"result\": false}, > > \"x509_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|- > private_key_managed\": > > {\"comment\": \"File /etc/pki/minion.key updated\", \"pchanges\": {}, > > \"n ame\": \"/etc/pki/minion.key\", > > \"start_time\": \"13:56:59.211237\", \"result\": true, \"duration\": > > 1166.283, \"__run_num__\": 6, \"changes\": \"New private > > key generated\", \"__id__\": > > \"/etc/pki/minion.key\"}}, \"retcode\": 2, \"success\": true, \"cmd\": > > \"_return\", \"_stamp\": \"2017-04-18T13:57:32.044625\", \ > > "fun\": \"state.sls\", \"id\": \"ppklablinux31\", > > \"out\": > > \"highstate\"}","alter_time":"2017-04-18T13:57:32.000Z"," > master_id":"ppklablinux30.localdomain_mast > > > > er","taken_at":"2017-04-18T13:57:37.000Z","processed_at":" > 2017-04-18T13:57:37.000Z","worker_id":"worker1"},{"id": > 77,"tag":"service.running","data":"{\"comment > > \": \"Service etcd has been enabled, > > and is dead\", \"_stamp\": \"2017-04-18T13:57:32.045629\", \"retcode\": > > 2, \"result\": false, \"start_time\": \"13:57:01. > > 400864\", \"__id__\": \"etcd\", \"duration\": 30561.242, > > \"__run_num__\": 17, \"changes\": {\"etcd\": true}, \"name\": > > \"etcd\"}","alter_time":"2017-04-18T13: > > 57:32.000Z","master_id":"ppklablinux30.localdomain_ > master","taken_at":"2017-04-18T13:57:37.000Z","processed_ > at":"2017-04-18T13:57:37.000Z","worker_id":"worker > > > > 1"},{"id":78,"tag":"20170418135732909927","data":"{\"_stamp\": > > \"2017-04-18T13:57:32.910393\", \"minions\": > > [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > > > > "2017-04-18T13:57:32.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-18T13:57:37.000Z"," > processed_at":"2017-04-18T13:57:37.000Z","wor > > > > ker_id":"worker1"},{"id":79,"tag":"salt/job/20170418135732909927/new"," > data":"{\"tgt_type\": > > \"list\", \"jid\": \"20170418135732909927\", \"tgt\": [\"null-005 > > 0568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:57:32.910923\", \"user\": \"root\", \"arg\": > > [\"20170418135657522690\"], \"fun\": \"saltutil.find_job\", > > \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:32.000Z","master_id":"ppklablinux30. > localdomain_master","taken_at":"2017-04-1 > > > > 8T13:57:37.000Z","processed_at":"2017-04-18T13:57:37.000Z" > ,"worker_id":"worker1"},{"id":80,"tag":"20170418135743253639","data":" > {\"_stamp\": > > \"2017-04-18T13:5 7:43.253949\", > > \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:43.000Z","master_id":"ppklablinux30. > localdomain_master","taken > > > > _at":"2017-04-18T13:57:47.000Z","processed_at":"2017-04- > 18T13:57:47.000Z","worker_id":"worker1"},{"id":81,"tag":" > salt/job/20170418135743253639/new","data":"{\ > > "tgt_type\": \"grain\", \"jid\": > > \"20170418135743253639\", \"tgt\": \"roles:nfs\", \"_stamp\": > > \"2017-04-18T13:57:43.254335\", \"user\": \"root\", \"arg\": [{ > > \"queue\": false, \"concurrent\": false, > > \"saltenv\": \"base\", \"__kwarg__\": true}], \"fun\": > > \"state.highstate\", \"minions\": [\"null-0050568303b8.pfizer. > > > > com\"]}","alter_time":"2017-04-18T13:57:43.000Z","master_ > id":"ppklablinux30.localdomain_master","taken_at" > :"2017-04-18T13:57:47.000Z","processed_at":"2017-04- > > > > 18T13:57:47.000Z","worker_id":"worker1"},{"id":82,"tag":" > 20170418135748355712","data":"{\"_stamp\": > > \"2017-04-18T13:57:48.356190\", \"minions\": [\"null-00505 > > 68303b8.pfizer.com > > \"]}","alter_time":"2017-04- > 18T13:57:48.000Z","master_id":"ppklablinux30.localdomain_ > master","taken_at":"2017-04-18T13:57:52.000Z","processe > > > > d_at":"2017-04-18T13:57:52.000Z","worker_id":"worker1"},{ > "id":83,"tag":"salt/job/20170418135748355712/new","data":"{\"tgt_type\": > > \"list\", \"jid\": \"2017041 > > 8135748355712\", \"tgt\": [\"null-0050568303b8.pfizer.com > > \"], \"_stamp\": > > \"2017-04-18T13:57:48.356761\", \"user\": \"root\", \"arg\": > > [\"20170418135743253639 \"], \"fun\": > > \"saltutil.find_job\", \"minions\": [\"null-0050568303b8.pfizer.com > > \"]}","alter_time": > "2017-04-18T13:57:48.000Z","master_id":"ppklablinux30.loca > > > > ldomain_master","taken_at":"2017-04-18T13:57:52.000Z"," > processed_at":"2017-04-18T13:57:52.000Z","worker_id":" > worker1"},{"id":84,"tag":"salt/run/20170418135525 > > 317500/ret","data":"{\"fun_args\": > > [{\"mods\": \"orch.kubernetes\"}], \"jid\": \"20170418135525317500\", > > \"return\": {\"outputter\": \"highstate\", \"data\": > > {\"ppklablinux30.localdomain_master\": > > {\"salt_|-reboot_setup_|-reboot_setup_|-state\": {\"comment\": \"One or > > more requisite failed: orch.kubernetes.etcd_pro > > xy_setup\", \"__run_num__\": 10, \"__sls__\": > > \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > > \"salt_|-ca_setup_|-ca_setup_|-state\": {\"comment\": > > \"States ran successfully. Updating ca.\", \"name\": > > \"ca_setup\", \"start_time\": \"13:56:01.361247\", \"result\": true, > > \"duration\": 25460.346, \"__run_num > > __\": 2, \"__jid__\": \"20170418135601489588\", \"changes\": {\"ret\": > > {\"ca\": > > {\"file_|-/etc/pki/issued_certs_|-/etc/pki/issued_certs_|-directory\": > > {\"comm ent\": \"Directory > > /etc/pki/issued_certs updated\", \"pchanges\": > > {\"/etc/pki/issued_certs\": {\"directory\": \"new\"}}, \"name\": > > \"/etc/pki/issued_certs\", > > \"start_time\": \"13:56:07.194634\", \"result\": true, \"duration\": > > 1.281, \"__run_num__\": 6, \"changes\": {\"/etc/pki/issued_certs\": > > \"New Dir\"}, \"__id_ _\": > > \"/etc/pki/issued_certs\"}, \"group_|-kube_group_|-kube_|-present\": > > {\"comment\": \"New group kube created\", \"name\": \"kube\", > > \"start_time\": \"13:5 6:03.585602\", > > \"result\": true, \"duration\": 492.98, \"__run_num__\": 2, \"changes\": > > {\"passwd\": \"x\", \"gid\": 492, \"name\": \"kube\", \"members\": []} > > , \"__id__\": \"kube_group\"}, > > \"module_|-mine.send_|-mine.send_|-run\": {\"comment\": \"Module > > function mine.send executed\", \"name\": \"mine.send\", \"star > > t_time\": \"13:56:08.526443\", \"result\": true, > > \"duration\": 522.106, \"__run_num__\": 11, \"changes\": {\"ret\": > > true}, \"__id__\": \"mine.send\"}, \"file_ > > |-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-managed\": {\"comment\": \"File > > /etc/pki/ca.crt exists with proper permissions. No changes made.\", > > \"pchanges\": {}, \" name\": > > \"/etc/pki/ca.crt\", \"start_time\": \"13:56:08.521611\", \"result\": > > true, \"duration\": 0.817, \"__run_num__\": 10, \"changes\": {}, > > \"__id__\": \"/ etc/pki/ca.crt\"}, > > \"file_|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ > repos.d/containers.repo_|-managed\": > > {\"comment\": \"File /etc/zypp/repos.d/containe > > rs.repo updated\", \"pchanges\": {}, \"name\": > > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > > \"13:56:03.255349\", \"result\": true, \"duration\": 162 > > .91, \"__run_num__\": 0, \"changes\": {\"diff\": \"New > > file\", \"mode\": \"0644\"}, \"__id__\": > > \"/etc/zypp/repos.d/containers.repo\"}, \"file_|-/etc/pki_|-/e > > tc/pki_|-directory\": {\"comment\": \"Directory > > /etc/pki is in the correct state\", \"pchanges\": {}, \"name\": > > \"/etc/pki\", \"start_time\": \"13:56:07.19341 > > 4\", \"result\": true, \"duration\": 1.082, \"__run_num__\": 5, > > \"changes\": {}, \"__id__\": \"/etc/pki\"}, > > \"x509_|-/etc/pki/ca.crt_|-/etc/pki/ca.crt_|-certi > > ficate_managed\": {\"comment\": \"File /etc/pki/ca.crt > > updated\", \"pchanges\": {}, \"name\": \"/etc/pki/ca.crt\", > > \"start_time\": \"13:56:08.483311\", \"resu > > lt\": true, \"duration\": 38.149, \"__run_num__\": 9, \"changes\": > > {\"Certificate\": {\"New\": {\"Not After\": \"2027-04-16 13:56:08\", > > \"SHA-256 Finger Print \": > > \"BF:C2:6C:31:46:B9:50:13:A2:E7:AD:BF:54:5E:FB:E5:C2:4C:E1: > 38:5A:0A:80:BC:AD:FC:79:92:24:E8:A8:97\", > > \"Subject Hash\": \"2F:0B:83:D6\", \"Serial Number\": > > \"F1:3D:64:29:EA:09:37:80\", \"SHA1 Finger Print\": > > \"20:2A:25:0D:0B:2F:91:E8:3F:92:F3:2B:7F:8A:C5:37:F1:1E:15:09\", > > \"X509v3 Extensions\": {\"subjectKeyIden > > tifier\": > > \"51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D:9F:5C:99\", > > \"keyUsage\": \"critical Certificate Sign, CRL Sign\", > > \"authorityKeyIdentifier\": > > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D: > 9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=ha > > > > ri.mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > > 29:EA:09:37:80\\n\>", > > \"basicConstraints\": \"critical CA:TRUE\"}, \"MD5 Finger Print\": > > \"A5:99:B1:1C:A3:48: > > E9:64:86:35:24:7F:41:1F:00:90\", \"Version\": 3, \"Key Size\": 4096, > > \"Public Key\": \"-----BEGIN PUBLIC > > KEY-----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAg > > > > EAzZD6PArP1r2y1UIXB43n\\nu/72U7XYVPk+LMGAqTkZqrAvtRj53PKCqbGZKOqNs9 > 9jcDvixS8kv72D4LzPuhtP\\nlZ4UjMyPPypkDGJU7PmTA0lB0Qok6 > dJSjedWbzORJo+BJ5J92r+a+WFHaGa9/pav\\ > > > > ng8cvSHNvUx6f6R1tTbw/aSsFK6/Sr3H8E1GcELo72rGYDZ2g00LPGq7j6 > S6B0Cyl\\nfomV90lGrDlIJF2ca8/vKFtmeBO+1CLz9fcHx/3j8s/ > lHxXp1cxldsrWOeUrvja+\\nBRgCvb/IhjjJ6d8dgcBGvBK > > > > 4fkxG65yDFO8IlGoHSxpuTQOfO6z5fcWWKr7k4gIA\\nqc6QhhtT5Tyq/ > 6TuH0owyvfRkLPIdkOIgYR8NrinATuDn3v3aeQaAWfB9ZipkS5z\\ > nYTaNj5hvvTCU3yhoxOtMVgJWLXn19TyeOoxpvplgE+lo+4S > > > > 4njIlVw+itNrvIG3P\\nhkUdQ4AEw/qEnk2iMXEs5Y9jESWX0nGD5csgMMzk > t6t646JTGWvQhbmFEECGyGqA\\nCxXeeCHPHJcSLqILSKf0x6MXrfN15 > DPNiscfcc5Bh3YUBdG3Gdmg4BvLtxtvrsq6\\nWxWN > > > > 792kR823ed734CmUvl3hEeAlddNBtIhJij1eq2h2OElsaW3wwQj92P5vYhg4 > \\nq1uON9QfUA+xyFImAQEQBSUCAwEAAQ==\\n-----END > > PUBLIC KEY-----\\n\", \"Issuer\": {\"C\": \"US\", \ > > "organizationName\": \"Pfizer\", \"CN\": \"localdomain\", > > \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAddress\": > > \"hari.mahadevan at pfizer.com \", > > \"GN\": \"N one\", \"surname\": > > \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > > Before\": \"2017-04-18 13:56:08\", \"Subject\": {\"C\": \"US\", \"orga > > nizationName\": \"Pfizer\", \"CN\": > > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", > > \"emailAddress\": \"hari.mahadevan at pfizer.com > > \", \"GN\": \"None\" > > , \"surname\": \"None\", \"OU\": \"BTI\"}}, \"Old\": > > \"/etc/pki/ca.crt does not exist.\"}}, \"__id__\": \"/etc/pki/ca.crt\"}, > > \"pkg_|-python-M2Crypto_|-python > > -M2Crypto_|-installed\": {\"comment\": \"Package python-M2Crypto is > > already installed\", \"name\": \"python-M2Crypto\", \"start_time\": > > \"13:56:06.872964\", \ "result\": true, > > \"duration\": 320.254, \"__run_num__\": 4, \"changes\": {}, \"__id__\": > > \"python-M2Crypto\"}, \"x509_|-/etc/pki/ca.key_|-/etc/pki/ca.key_|-pr > > ivate_key_managed\": {\"comment\": \"File > > /etc/pki/ca.key updated\", \"pchanges\": {}, \"name\": > > \"/etc/pki/ca.key\", \"start_time\": \"13:56:07.198826\", \"r > > esult\": true, \"duration\": 1282.75, > > \"__run_num__\": 7, \"changes\": \"New private key generated\", > > \"__id__\": \"/etc/pki/ca.key\"}, \"file_|-/etc/pki/ca.k > > ey_|-/etc/pki/ca.key_|-managed\": {\"comment\": \"\", > > \"pchanges\": {}, \"name\": \"/etc/pki/ca.key\", \"start_time\": > > \"13:56:08.481733\", \"result\": true, > > \"duration\": 1.035, \"__run_num__\": 8, \"changes\": {\"mode\": > > \"0600\"}, \"__id__\": \"/etc/pki/ca.key\"}, > > \"user_|-kube_user_|-kube_|-present\": {\"commen > > t\": \"New user kube created\", \"name\": \"kube\", > > \"start_time\": \"13:56:04.094251\", \"result\": true, \"duration\": > > 602.999, \"__run_num__\": 3, \"change > > s\": {\"shell\": \"/bin/bash\", \"workphone\": \"\", \"uid\": 1000, > > \"passwd\": \"x\", \"roomnumber\": \"\", \"gid\": 100, \"groups\": > > [\"kube\", \"users\"], \"home\": \"\", > > \"fullname\": \"\", \"homephone\": \"\", \"name\": \"kube\"}, > > \"__id__\": \"kube_user\"}, \"file_|-/etc/motd_|-/etc/motd_|-managed\": > > {\"comme nt\": \"File /etc/motd > > updated\", \"pchanges\": {}, \"name\": \"/etc/motd\", \"start_time\": > > \"13:56:03.418415\", \"result\": true, \"duration\": 145.221, \"_ > > _run_num__\": 1, \"changes\": {\"diff\": > > \"--- \\n+++ \\n@@ -0,0 +1,3 @@\\n+Welcome to > > ppklablinux30.localdomain.\\n+The roles of this node are:\\n+ - ca\\n\ > > "}, \"__id__\": \"/etc/motd\"}}}, > > \"out\": \"highstate\"}, \"__id__\": \"ca_setup\"}, > > \"salt_|-kube_master_setup_|-kube_master_setup_|-state\": {\"comment\": > > \"One or more requisite failed: > > orch.kubernetes.etcd_proxy_setup\", \"__run_num__\": 6, \"__sls__\": > > \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > > > > \"salt_|-etcd_proxy_setup_|-etcd_proxy_setup_|-state\": {\"comment\": > > \"Run failed on minions: ppklablinux31\\nFailures:\\n > > ppklablinux31:\\n --------- -\\n > > ID: /etc/zypp/repos.d/containers.repo\\n Function: > > file.managed\\n Result: True\\n Comment: File > > /etc/zypp/repos.d/c ontainers.repo is > > in the correct state\\n Started: 13:56:58.373899\\n > > Duration: 59.059 ms\\n Changes: \\n ----------\\n > > ID: python-M2Crypto\\n > > Function: pkg.installed\\n Result: True\\n Comment: > > Package python-M2Crypto is already installed\\n > > Started: 13:56:58.963258\\n Duration: 239.098 > > ms\\n Changes: \\n ----------\\n ID: > > /etc/pki\\n Function: file.director > > y\\n Result: True\\n Comment: Directory /etc/pki is > > in the correct state\\n Started: 13:56:59.202569\\n > > Duration: 1.123 ms\\n > > Changes: \\n ----------\\n ID: > > /etc/pki/trust/anchors\\n Function: file.directory\\n > > Result: True\\n Comment : > > Directory /etc/pki/trust/anchors is in the correct state\\n > > Started: 13:56:59.203831\\n Duration: 0.989 ms\\n > > Changes: \\n ----- -----\\n > > ID: /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n Function: > > x509.pem_managed\\n Result: True\\n Comment: File /etc > > /pki/trust/anchors/SUSE_CaaSP_CA.crt > > updated\\n Started: 13:56:59.205883\\n Duration: 3.666 > > ms\\n Changes: \\n ----- > > -----\\n diff:\\n New > > file\\n ----------\\n ID: > > /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n Funct > > ion: file.managed\\n Result: True\\n > > Comment: File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists with > > proper permissions. No changes made.\ > > \n Started: 13:56:59.209683\\n Duration: 0.895 ms\\n > > Changes: \\n ----------\\n ID: > > /etc/pki/minion.key\\n Fun > > ction: x509.private_key_managed\\n Result: True\\n > > Comment: File /etc/pki/minion.key updated\\n Started: > > 13:56:59.211237\\n Du ration: > > 1166.283 ms\\n Changes: Invalid Changes data: New private key > > generated\\n ----------\\n ID: /etc/pki/minion.key\\n > > F unction: file.managed\\n > > Result: True\\n Comment: File /etc/pki/minion.key exists with > > proper permissions. No changes made.\\n Starte > > d: 13:57:00.377681\\n Duration: 0.889 ms\\n > > Changes: \\n ----------\\n ID: > > /etc/pki/minion.crt\\n Function: x509.certi > > ficate_managed\\n Result: True\\n Comment: > > File /etc/pki/minion.crt updated\\n Started: 13:57:00.378988\\n > > Duration: 784.241 m s\\n > > Changes: \\n ----------\\n > > Certificate:\\n ----------\\n > > New:\\n > > ----------\\n Issuer:\\n > > ----------\\n C:\\n > > US\\n > > CN:\\n localdomain\\n > > GN:\\n > > None\\n L:\\n > > Pearl River\\n > > OU:\\n > > BTI\\n SP:\\n > > NY\\n emailAddress:\\n > > > > hari.mahadevan at pfizer.com \\n > > organizationName:\\n > > Pfizer\\n > > surname:\\n None\\n > > Issuer Hash:\\n 2F:0B:83:D > > 6\\n Key Size:\\n > > 4096\\n MD5 Finger > > Print:\\n 60: > > B2:03:54:A9:98:50:F6:67:52:DB:CA:EC:99:9E:12\\n > > Not After:\\n 2017-07-27 13:57:00\\n > > Not Before:\\n > > 2017-04-18 13:57:00\\n > > Public Key:\\n -----BEGIN PUBLI > > C KEY-----\\n > > MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzPxZXSYBB19t4tJGjHBE\\n > > uXGuonX5+UGXOCHk0q > > j8onDaXX8acbDlNcc+9JLOaMWEDgRn+4skZArYcbruEI1k\\n > > > > qPU5zMjmeE0UxqBwAAJpOswHiU3Bq28lpmXdHXI2XVqTbSVpWTfmsSLSzJz62/ff\\n > > > > StCc2QFH9/UxtdlQ2tkdIuwEF4IekRib7lEXhnL+phlBNrdUZeJ4HtSSNPNtt9qu\\n > > 7jRfFsgryXNIAbtfDwCcV9FEhiqxvgY7Cfp0u9+CNpZ > > 2Vc6kHWOk0NUXnrka8KQS\\n > > > > pYnZeq2Z0//7cfFUVD+bBIish067aukPVHNHdfYasmzBHDctYDOTpnPBU+hcg/jx\\n > > XqDAVDC > > cL1xUy7s4DvdiD4eQQag51mZSYtpzGFEK2qr23CUmZA/j/zWwok/fcACG\\n > > > > IICtGyq0/oVnrK2AXBAVh51VAH+NnjuQWD/Hy+GcqdgL9q/GC0+ncdr+iT0Aply8\\n > > > > Xp1cQW6MgiGwe7cQghgnsPFEL75Ps8ni1Gk7Y+B43m3RZY3I0njhBqEqEINRZ6T/\\n > > K/eOWw8LeFK2SQT9eIt1neNIkZTlO3Lu > > UPsDP/uMJayFczYH3nDZMWJrmqhMlECa\\n > > > > /FHRhtL72iGqbv8M5AEu8fYnaY1MTyLbLmaxpsg/oTjEUWIjfAhWh8kphDf5t0E2\\n > > > > Tt2seUdGCmPTyLmhY90TmUMCAwEAAQ==\\n > > -----END PUBLIC KEY-----\\n SHA-256 Finger > > Print:\\n > > A0:CD:51:FE:5C:8E:F0:B2:AD:40:82:AC:75:0B:85:77:AC:15:E1:76: > 20:24:22:2B:01:D9:5D:B3:9F:8D:C3:00\\n > > SHA1 Finger Prin > > t:\\n > > 72:E8:0C:33:2D:49:BB:10:A5:53:6B:17:DC:15:1B:E6:BA:FB:7C:FE\\n > > Serial Number:\\n > > CB:E0:DD:92:DC:7E:F6:F2\\n > > Subject:\\n ----------\\n > > C:\\n > > US\\n CN:\\n > > ppklablinux31.localdomain\\n > > GN:\\n > > None\\n L:\\n > > Pearl River\\n > > OU:\\n BTI\\n > > SP:\\n NY\\n > > e > > mailAddress:\\n > > hari.mahadevan at pfizer.com \\n > > organizationName:\\n > > Pfizer\\n > > surname:\\n None\\n > > Subject Hash:\\n > > 03:5E:85:4C\\n Version:\\n > > 3\\n X509v3 > > Extensions:\\n > > ----------\\n > > authorityKeyIdentifier:\\n > > keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:5 > > 1:47:45:3F:4D:9F:5C:99\\n > > DirName:/C=US/CN=localdomain/L=Pearl > > River/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari.mahadeva > > n at pfizer.com/SN=None\\n > > > > serial:F1:3D:64:29:EA:09:37:80\\n > > basicConstraints:\\n > > critical CA:FALSE\\n > > keyUsage:\\n critical Key > > Encipherment\\n > > subjectKeyIdentifier:\\n > > FC:3D:3E:8E:38:B5:A7:37:06:CF:8D:E5:23:31:85:F9:C4:DB:2E:0C\\n > > Old: \\n > > /etc/pki/minion.crt does not exist.\\n ----------\\n > > ID: /etc/pki/minion.crt\\n Function: file.managed\\n > > Result: True\\n Comment: File > > /etc/pki/minion.crt exists with proper permissions. No changes made.\\n > > Started: 13:57:01.163388\\n > > Duration: 0.834 ms\\n Changes: \\n ----------\\n > > ID: etcd\\n Function: group.present\\n Result: > > True\\n Comment: Group etcd is > > present and up to date\\n Started: 13:57:01.164678\\n > > Duration: 0.482 ms\\n Changes: \\n ----------\\n > > ID: etcd\\n Function: > > user.present\\n Result: True\\n Comment: User etcd is > > present and up to date\\n Started: 13:57: > > 01.166178\\n Duration: 1.237 ms\\n Changes: > > \\n ----------\\n ID: etcd\\n Function: > > file.directory\\n Name: > > /var/lib/etcd\\n Result: True\\n Comment: Directory > > /var/lib/etcd updated\\n Started: 13:57:01.167829\\n > > Duration: 1.373 ms\\ n > > Changes: \\n ----------\\n mode:\\n > > 0700\\n ----------\\n ID: etcd\\n > > Function: pkg.installed\\n > > Result: True\\n Comment: All specified packages are already > > installed\\n Started: 13:57:01.169779\\n > > Duration: 13.51 ms\\n Changes: \\n > > ----------\\n ID: etcd\\n Function: > > iptables.append\\n Result: True\\n > > Comment: Set iptables rule for etcd to: /usr/sbin/iptables > > --wait -t filter -A INPUT -p tcp -m state --state NEW -m multiport > > --dports 2379,2380,4001 --jum p ACCEPT > > for ipv4\\n Started: 13:57:01.186448\\n Duration: 82.853 > > ms\\n Changes: \\n ----------\\n > > locale:\\n > > etcd\\n ----------\\n ID: /etc/sysconfig/etcd\\n > > Function: file.managed\\n Result: True\\n > > Comment: File /etc/sysconfig/etcd updated\\n > > Started: 13:57:01.269992\\n Duration: 83.05 ms\\n > > Changes: \\n --- > > -------\\n diff:\\n --- \\n > > +++ \\n @@ -1,47 +1,30 @@\\n > > -# [member]\\n > > -ETCD_NAME=default\\n > > -ETCD_DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n > > -#ETC D_WAL_DIR=\\\"\\\"\\n > > -#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\n > > -#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n > > -#ETCD_ELECTION_TIMEOUT=\\\"1000\\\"\\n > > -#ETCD_LISTEN_PEER_URLS=\\\"http://localhost:2380\\\"\\n > > -ETCD_LISTEN > > _CLIENT_URLS=\\\"http://localhost:2379\\\"\\n > > -#ETCD_MAX_SNAPSHOTS=\\\"5\\\"\\n > > -#ETCD_MAX_WALS=\\\"5\\\"\\n > > -#ETCD_CORS=\\\"\\\"\\n -#\\n > > -#[cluster]\\n > > -#ETCD_INITIAL_ADVERTISE_PEER_URLS=\ > > \\"http://localhost:2380\\\"\\n -# if you use > > different ETCD_NAME (e.g. test), set ETCD_INITIAL_CLUSTER value for this > > name, i.e. \\\"tes t=http://...\\\"\\n > > > > -#ETCD_INITIAL_CLUSTER=\\\"default=http://localhost:2380\\\"\\n > > -#ETCD_INITIAL_CLUSTER_STATE=\\\ > > "new\\\"\\n > > -#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd-cluster\\\"\\n > > -ETCD_ADVERTISE_CLIENT_URLS=\\\"http://localhost:23 > > 79\\\"\\n > > -#ETCD_DISCOVERY=\\\"\\\"\\n > > -#ETCD_DISCOVERY_SRV=\\\"\\\"\\n > > -#ETCD_DISCOVERY_FALLBA > > CK=\\\"proxy\\\"\\n > > -#ETCD_DISCOVERY_PROXY=\\\"\\\"\\n -#\\n > > -#[proxy]\\n > > -#ETCD_PROXY=\\\"off\\\"\\n > > -#ETCD_PROXY_FAILURE_WAIT=\\\"5000\\\"\\n > > -#ETCD_PROXY_REFRESH_INTERVAL=\\\"30000\\\"\\n > > -#ETCD_PROXY_DIAL_TIMEOUT=\\\"1000\\\"\\n > > -#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n > > -#ETCD_PR > > OXY_READ_TIMEOUT=\\\"0\\\"\\n -#\\n > > -#[security]\\n -#ETCD_CERT_FILE=\\\"\\\"\\n > > > > -#ETCD_KEY_FILE=\\\"\\\"\\n > > -#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n > > -#ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n > > -#ETCD_PEER_CERT_FILE=\\\"\\\"\\n > > -#ETCD_PEER_KEY_FILE=\\\"\\\"\\n > > -#ETCD_PEER_CLIENT_CERT_AUTH=\\\" > > false\\\"\\n > > -#ETCD_PEER_TRUSTED_CA_FILE=\\\"\\\"\\n -#\\n > > -#[logging]\\n > > -#ETCD_DEBUG=\\\"false\\\"\\n -# > > examples for -log-package-levels etcdserver=WARNING,security=DEBUG\\n > > -#ETCD_LOG_PA > > CKAGE_LEVELS=\\\"\\\"\\n +# etcd proxy > > configuration\\n +# see > > https://coreos.com/etcd/docs/latest/op-guide/configur > > ation.html\\n +\\n > > +ETCD_DATA_DIR=\\\"/var/lib/etcd/\\\"\\n > > +ETCD_NAME=\\\"ppklablinux31\\\"\\n > > +\\n > > +ETCD_LISTEN_CLIENT_URLS=\\\"http://0.0.0.0:2379\\\"\\n > > +ETCD_LISTEN_PEER_URLS=\\\"https: > > //0.0.0.0:2380 \\\"\\n +\\n > > > > +ETCD_ADVERTISE_CLIENT_URLS=\\\"http://ppklablinux31.localdomain:2379, > http://10.34.246.31 > > :2379\\\"\\n +\\n > > > > +ETCD_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n > > +ETCD_CERT_FILE=/et > > c/pki/minion.crt\\n > > +ETCD_KEY_FILE=/etc/pki/minion.key\\n > > +ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA > > .crt\\n +\\n > > +ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n > > +ETCD_PEER_CERT_FIL > > E=/etc/pki/minion.crt\\n > > +ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\n > > +ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchor > > s/SUSE_CaaSP_CA.crt\\n +# > > ETCD_PEER_CLIENT_CERT_AUTH=on\\n +# > > ETCD_PEER_AUTO_TLS=on\\n +\\n > > +# discovery\\n > > +ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer.com:2379/ > v2/keys/_etcd/registry/k8s\\\"\\n > > > > +ETCD_DISCOVERY_FALLBACK=\\\"proxy\\\"\\n +\\n > > +ETCD_INITIAL_CLUSTER_TOKEN=\\\"k8s\\\"\\n > > > > +ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"https:// > ppklablinux31.localdomain:2380,https://10.34.246.31:2380\\\"\\n > > +ETCD_INITIAL_CLUSTER_S > > TATE=\\\"new\\\"\\n group:\\n > > etcd\\n user:\\n etcd\\n > > ----------\\n ID: > > etcd\\n Function: cmd.run\\n Name: rm -rf > > /var/lib/etcd/*\\n Result: True\\n Comment: Command > > \\\"rm -rf /var/lib/et cd/*\\\" run\\n > > Started: 13:57:01.391652\\n Duration: 8.113 ms\\n > > Changes: \\n ----------\\n pid:\\ > > n 3293\\n > > retcode:\\n 0\\n stderr:\\n > > stdout:\\n ----------\\n > > ID: etcd\\n Function: service.running\\n > > Result: False\\n Comment: Service etcd has been enabled, and > > is dead\\n Started: > > 13:57:01.400864\\n Duration: 30561.242 ms\\n Changes: > > \\n ----------\\n etcd:\\n > > True\\n ----------\\n > > ID: /etc/systemd/system/etcd.service.d/etcd.conf\\n > > Function: file.managed\\n Result: True\\n > > Comment: File > > /etc/systemd/system/etcd.service.d/etcd.conf updated\\n Started: > > 13:57:31.962373\\n Duration: 71.157 ms\\n Changes: > > \\n ----------\\n > > diff:\\n New file\\n > > mode:\\n 0644\\n \\n > > Summary for ppklablinux31\\n -------------\\n > > Succeeded: 18 (changed=9)\\n Failed: 1\\n -------------\\n > > Total states run: 19\\n To tal > > run time: 33.080 s\\n\", \"name\": \"etcd_proxy_setup\", > > \"start_time\": \"13:56:57.390285\", \"result\": false, \"duration\": > > 45614.033, \"__run_num__\ ": 5, > > \"__jid__\": \"20170418135657522690\", \"changes\": {\"ret\": > > {\"null-0050568c7c69.pfizer.com \": > > {\"file_|-/etc/pki/trust/anchors_|-/etc/pki/trust/ancho > > rs_|-directory\": {\"comment\": \"Directory > > /etc/pki/trust/anchors is in the correct state\", \"pchanges\": {}, > > \"name\": \"/etc/pki/trust/anchors\", \"start_ > > time\": \"13:57:02.841138\", \"result\": true, \"duration\": > > 0.957, \"__run_num__\": 3, \"changes\": {}, \"__id__\": > > \"/etc/pki/trust/anchors\"}, \"group_|-et > > cd_|-etcd_|-present\": {\"comment\": \"Group etcd is present and up > > to date\", \"name\": \"etcd\", \"start_time\": \"13:57:05.446135\", > > \"result\": true, \"du ration\": 0.478, > > \"__run_num__\": 10, \"changes\": {}, \"__id__\": \"etcd\"}, > > \"file_|-/etc/pki/minion.key_|-/etc/pki/minion.key_|-managed\": > > {\"comment\": \" File > > /etc/pki/minion.key exists with proper permissions. No changes made.\", > > \"pchanges\": {}, \"name\": \"/etc/pki/minion.key\", \"start_time\": > > \"13:57:04.6 75638\", \"result\": true, > > \"duration\": 0.806, \"__run_num__\": 7, \"changes\": {}, \"__id__\": > > \"/etc/pki/minion.key\"}, \"file_|-/etc/pki/trust/anchors/SUS > > > > E_CaaSP_CA.crt_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-managed\": > > {\"comment\": \"File /etc/pki/trust/anchors/SUSE_CaaSP_CA.crt exists > > with proper permis sions. No changes > > made.\", \"pchanges\": {}, \"name\": > > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > > \"13:57:02.868940\", \"result\": true, \" > > duration\": 0.844, \"__run_num__\": 5, \"changes\": {}, \"__id__\": > > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > > \"file_|-/etc/systemd/system/etcd.service.d > > > > /etcd.conf_|-/etc/systemd/system/etcd.service.d/etcd.conf_|-managed\": > > {\"comment\": \"File /etc/systemd/system/etcd.service.d/etcd.conf > > updated\", \"pchanges \": {}, \"name\": > > \"/etc/systemd/system/etcd.service.d/etcd.conf\", \"start_time\": > > \"13:57:07.212834\", \"result\": true, \"duration\": 71.567, > > \"__run_num__ \": 18, \"changes\": > > {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": > > \"/etc/systemd/system/etcd.service.d/etcd.conf\"}, > > \"file_|-/etc/pki/minion.crt > > _|-/etc/pki/minion.crt_|-managed\": {\"comment\": \"File > > /etc/pki/minion.crt exists with proper permissions. No changes made.\", > > \"pchanges\": {}, \"name\": \ > > "/etc/pki/minion.crt\", \"start_time\": \"13:57:05.443918\", > > \"result\": true, \"duration\": 0.834, \"__run_num__\": 9, \"changes\": > > {}, \"__id__\": \"/etc/pk > > i/minion.crt\"}, > > \"x509_|-/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-/ > etc/pki/trust/anchors/SUSE_CaaSP_CA.crt_|-pem_managed\": > > {\"comment\": \"File /etc/pki/t > > rust/anchors/SUSE_CaaSP_CA.crt updated\", \"pchanges\": {}, \"name\": > > \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\", \"start_time\": > > \"13:57:02.865531\", \"res ult\": true, > > \"duration\": 3.272, \"__run_num__\": 4, \"changes\": {\"diff\": \"New > > file\"}, \"__id__\": \"/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\"}, > > \"file > > _|-/etc/zypp/repos.d/containers.repo_|-/etc/zypp/ > repos.d/containers.repo_|-managed\": > > {\"comment\": \"File /etc/zypp/repos.d/containers.repo updated\", \"pcha > > nges\": {}, \"name\": > > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > > \"13:56:58.408694\", \"result\": true, \"duration\": 153.355, > > \"__run_num__\": 0, \"changes\": > > {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": > > \"/etc/zypp/repos.d/containers.repo\"}, > > \"pkg_|-etcd_|-etcd_|-installed\": {\"comment\ > > ": \"All specified packages are already installed\", \"name\": > > \"etcd\", \"start_time\": \"13:57:05.454362\", \"result\": true, > > \"duration\": 13.399, \"__run_ num__\": > > 13, \"changes\": {}, \"__id__\": \"etcd\"}, > > \"service_|-etcd_|-etcd_|-running\": {\"comment\": \"Service etcd has > > been enabled, and is running\", \"n > > ame\": \"etcd\", \"start_time\": \"13:57:05.747520\", \"__id__\": > > \"etcd\", \"duration\": 1465.078, \"__run_num__\": 17, \"changes\": > > {\"etcd\": true}, \"resu lt\": true}, > > \"pkg_|-python-M2Crypto_|-python-M2Crypto_|-installed\": {\"comment\": > > \"Package python-M2Crypto is already installed\", \"name\": > > \"python-M2Cry pto\", \"start_time\": > > \"13:57:02.340920\", \"result\": true, \"duration\": 498.795, > > \"__run_num__\": 1, \"changes\": {}, \"__id__\": \"python-M2Crypto\"}, > > \" user_|-etcd_|-etcd_|-present\": > > {\"comment\": \"User etcd is present and up to date\", \"name\": > > \"etcd\", \"start_time\": \"13:57:05.450830\", \"result\": tr > > ue, \"duration\": 1.177, \"__run_num__\": 11, > > \"changes\": {}, \"__id__\": \"etcd\"}, > > \"file_|-etcd_|-/var/lib/etcd_|-directory\": {\"comment\": \"Directory / > > var/lib/etcd updated\", \"pchanges\": > > {\"/var/lib/etcd\": {\"mode\": \"0700\"}}, \"name\": \"/var/lib/etcd\", > > \"start_time\": \"13:57:05.452433\", \"result\": > > true, \"duration\": 1.332, \"__run_num__\": 12, \"changes\": > > {\"mode\": \"0700\"}, \"__id__\": \"etcd\"}, > > \"file_|-/etc/sysconfig/etcd_|-/etc/sysconfig/etcd_ > > |-managed\": {\"comment\": \"File /etc/sysconfig/etcd > > updated\", \"pchanges\": {}, \"name\": \"/etc/sysconfig/etcd\", > > \"start_time\": \"13:57:05.605471\", \"r > > esult\": true, \"duration\": 83.655, \"__run_num__\": 15, \"changes\": > > {\"diff\": \"--- \\n+++ \\n@@ -1,47 +1,30 @@\\n-# > > [member]\\n-ETCD_NAME=default\\n-ETCD > > _DATA_DIR=\\\"/var/lib/etcd/default.etcd\\\"\\n-#ETCD_WAL_ > DIR=\\\"\\\"\\n-#ETCD_SNAPSHOT_COUNT=\\\"10000\\\"\\ > n-#ETCD_HEARTBEAT_INTERVAL=\\\"100\\\"\\n-#ETCD_ > > > > ELECTION_TIMEOUT=\\\"1000\\\"\\n-#ETCD_LISTEN_PEER_URLS=\\\" > http://localhost:2380\\\"\\n-ETCD_LISTEN_CLIENT_URLS=\\\"ht > tp://localhost:2379\\\"\\n-#ETCD_MAX_SN > > > > APSHOTS=\\\"5\\\"\\n-#ETCD_MAX_WALS=\\\"5\\\"\\n-#ETCD_ > CORS=\\\"\\\"\\n-#\\n-#[cluster]\\n-#ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\" > http://localhost:2380\\\"\\n- > > # if you use different ETCD_NAME (e.g. > > test), set ETCD_INITIAL_CLUSTER value for this name, i.e. > > \\\"test=http://...\\\"\\n-#ETCD_INITIAL_CLUSTER=\\\"default= > > > > http://localhost:2380\\\"\\n-#ETCD_INITIAL_CLUSTER_STATE=\\\ > "new\\\"\\n-#ETCD_INITIAL_CLUSTER_TOKEN=\\\"etcd- > cluster\\\"\\n-ETCD_ADVERTISE_CLIENT_URLS=\\\"htt > > > > p://localhost:2379\\\"\\n-#ETCD_DISCOVERY=\\\"\\\"\\n-# > ETCD_DISCOVERY_SRV=\\\"\\\"\\n-#ETCD_DISCOVERY_FALLBACK=\\\ > "proxy\\\"\\n-#ETCD_DISCOVERY_PROXY=\\\"\\\" > > > > \\n-#\\n-#[proxy]\\n-#ETCD_PROXY=\\\"off\\\"\\n-#ETCD_ > PROXY_FAILURE_WAIT=\\\"5000\\\"\\n-#ETCD_PROXY_REFRESH_ > INTERVAL=\\\"30000\\\"\\n-#ETCD_PROXY_DIAL_TIMEOU > > > > T=\\\"1000\\\"\\n-#ETCD_PROXY_WRITE_TIMEOUT=\\\"5000\\\"\\n- > #ETCD_PROXY_READ_TIMEOUT=\\\"0\\\"\\n-#\\n-#[security]\\n-# > ETCD_CERT_FILE=\\\"\\\"\\n-#ETCD_KEY_FI > > > > LE=\\\"\\\"\\n-#ETCD_CLIENT_CERT_AUTH=\\\"false\\\"\\n-# > ETCD_TRUSTED_CA_FILE=\\\"\\\"\\n-#ETCD_PEER_CERT_FILE=\\\"\\ > \"\\n-#ETCD_PEER_KEY_FILE=\\\"\\\"\\n-#ETC > > > > D_PEER_CLIENT_CERT_AUTH=\\\"false\\\"\\n-#ETCD_PEER_ > TRUSTED_CA_FILE=\\\"\\\"\\n-#\\n-#[logging]\\n-#ETCD_DEBUG=\ > \\"false\\\"\\n-# > > examples for -log-package-le vels > > etcdserver=WARNING,security=DEBUG\\n-#ETCD_LOG_PACKAGE_ > LEVELS=\\\"\\\"\\n+# > > etcd proxy configuration\\n+# see > > https://coreos.com/etcd/docs/latest/op-guid > > > > e/configuration.html\\n+\\n+ETCD_DATA_DIR=\\\"/var/lib/ > etcd/\\\"\\n+ETCD_NAME=\\\"null-0050568c7c69.pfizer.com > > \\\"\\n+\\n+ETCD_ > LISTEN_CLIENT_URLS=\\\"http://0 > > > > .0.0.0:2379\\\"\\n+ETCD_LISTEN_PEER_URLS=\\\"https://0.0.0.0:2380 > \\\"\\n+\\n+ETCD_ADVERTISE_CLIENT_URLS=\\\"http > ://null-0050568c7c69.pfizer.com:2379,http://10 > > > > .34.246.88:2379\\\"\\n+\\n+ETCD_CA_FILE=/etc/pki/trust/ > anchors/SUSE_CaaSP_CA.crt\\n+ETCD_CERT_FILE=/etc/pki/ > minion.crt\\n+ETCD_KEY_FILE=/etc/pki/minion.key\\n > > > > +ETCD_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_ > CA.crt\\n+\\n+ETCD_PEER_CA_FILE=/etc/pki/trust/anchors/ > SUSE_CaaSP_CA.crt\\n+ETCD_PEER_CERT_FILE=/etc/p > > > > ki/minion.crt\\n+ETCD_PEER_KEY_FILE=/etc/pki/minion.key\\ > n+ETCD_PEER_TRUSTED_CA_FILE=/etc/pki/trust/anchors/SUSE_CaaSP_CA.crt\\n+# > > ETCD_PEER_CLIENT_CERT_AUTH= on\\n+# > > ETCD_PEER_AUTO_TLS=on\\n+\\n+# > > discovery\\n+ETCD_DISCOVERY=\\\"http://ppklablinux30.pfizer. > com:2379/v2/keys/_etcd/registry/k8s\\\"\\n+ETCD_DISCOVERY_F > > > > ALLBACK=\\\"proxy\\\"\\n+\\n+ETCD_INITIAL_CLUSTER_TOKEN=\\\ > "k8s\\\"\\n+ETCD_INITIAL_ADVERTISE_PEER_URLS=\\\"https: > //null-0050568c7c69.pfizer.com:2380,https:// > > 10.34.246.88:2380 > > \\\"\\n+ETCD_INITIAL_CLUSTER_ > STATE=\\\"new\\\"\\n\", > > \"group\": \"etcd\", \"user\": \"etcd\"}, \"__id__\": > > \"/etc/sysconfig/etcd\"}, \"x509_| > > -/etc/pki/minion.crt_|-/etc/pki/minion.crt_|-certificate_managed\": > > {\"comment\": \"File /etc/pki/minion.crt updated\", \"pchanges\": {}, > > \"name\": \"/etc/pki /minion.crt\", > > \"start_time\": \"13:57:04.676856\", \"result\": true, \"duration\": > > 766.905, \"__run_num__\": 8, \"changes\": {\"Certificate\": {\"New\": > > {\"N ot After\": \"2017-07-27 > > 13:57:05\", \"SHA-256 Finger Print\": > > \"D2:F8:80:38:D9:D5:1C:C0:EC:9A:3E:5A:34:C2:F8:22:36:E5:DB: > C0:F3:E8:E3:7A:1D:60:96:5F:FD:23:FD: > > 5E\", \"Subject Hash\": > > \"0F:F8:79:4C\", \"Serial Number\": \"25:B5:7F:89:5A:2F:2E:B1\", \"SHA1 > > Finger Print\": \"1F:2B:E1:94:FA:EF:F4:4C:43:D1:5B:E9:8C:2D:5C > > :3F:46:99:70:DD\", \"X509v3 Extensions\": > > {\"subjectKeyIdentifier\": > > \"15:A9:34:9A:0C:C6:72:A8:34:BE:D9:87:2B:54:4C:11:4F:5F:25:9B\", > > \"keyUsage\": \"critical Key > > Encipherment\", \"authorityKeyIdentifier\": > > \"keyid:51:73:90:43:50:7F:8A:BB:9B:42:45:1A:51:47:45:3F:4D: > 9F:5C:99\\nDirName:/C=US/CN=localdomain/L=Pearl > > Ri > > ver/ST=NY/O=Pfizer/GN=None/OU=BTI/emailAddress=hari. > mahadevan at pfizer.com/SN=None\\nserial:F1:3D:64:29:EA:09:37:80\\n\ > > 29:EA:09:37:80\\n\>", > > \"basicConstraints\": \"critical CA:FA > > LSE\"}, \"MD5 Finger Print\": > > \"72:69:54:30:5F:7D:BD:F7:6B:14:8C:6B:90:DD:8D:D2\", \"Version\": 3, > > \"Key Size\": 4096, \"Public Key\": \"-----BEGIN PUBLIC KEY > > > > -----\\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsJwiQvD2nyGP6Ia > J8FZv\\n65O7b6IjycWfkW3ZKtraVClFSyEZ958qXSJ1nUVmdYvuKAiGmXeUTi0ZuvS > zxL48\\nAI+NcJgLaa5aV+B9 > > > > xoiq5uME4XDcotDwNRnqt+JfVSeHPd0HcA5agSIhG93Bp7H+\\npS0GYvYXOptF/ > x4jjd29jJ1nZEhuN4RvPTK2D1xnND+capMnXXAoIypQg7Wozml3\\ > nCaZhM6v3ltegKAOMmu2bZQirZrvm8b9NgBWLGNfn > > > > dRWaSVjF6flFn2feylfJgeBF\\n2k0JK9TfyG01ER8+n4cEdUh+ > 8zzGKS3bRGrBnvNO9A3GWaR4PiGL/B9vqiZGn4Un\\ntskiQz9jB1qlSjqNa7w+uSrye/ > RjxsApNxLLK8Oo4Ts5LSBYsVJ8yCh3KSkUeyQh > > > > \\nU5/iJ26dyyEDwnbz6e1ly8hRL6yoofRHATq5m89J4to6UoBjugWWrRpQXsOBm98 > /\\n04dWeKeCZuRNzR+YHugdNUzPds/11XFvuV8zixvSvWctTm/PjikFzLYLQMzuQcPD\\ > neNAIdetOQuzr/EEBBSfg+ > > > > dPdedIOWBZMAZyRkH+Rna6PwkxXJP8nXt8NM3yH1Hi8\\ > n09LUFhhyuXci8PQzEvVEcfpLop0a95GJHnNg21xtUoW7Vxi00V1TpH6MWvl+Zomx\\ > n9y8CQgRGuJvWqnr3u3DTXj0CAwEAAQ==\\n-----END > > P UBLIC KEY-----\\n\", \"Issuer\": > > {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > > \"localdomain\", \"SP\": \"NY\", \"L\": \"Pearl River\", \"emailAdd > > ress\": \"hari.mahadevan at pfizer.com > > \", \"GN\": \"None\", \"surname\": > > \"None\", \"OU\": \"BTI\"}, \"Issuer Hash\": \"2F:0B:83:D6\", \"Not > > Before\": \"2017-04- 18 13:57:05\", > > \"Subject\": {\"C\": \"US\", \"organizationName\": \"Pfizer\", \"CN\": > > \"null-0050568c7c69.pfizer.com \", > > \"SP\": \"NY\", \"L\": \"Pearl River\" > > , \"emailAddress\": \"hari.mahadevan at pfizer.com > > \", \"GN\": \"None\", \"surname\": > > \"None\", \"OU\": \"BTI\"}}, \"Old\": \"/etc/pki/minion.crt does not > > exist.\ "}}, \"__id__\": > > \"/etc/pki/minion.crt\"}, \"file_|-/etc/pki_|-/etc/pki_|-directory\": > > {\"comment\": \"Directory /etc/pki is in the correct state\", \"pchange > > s\": {}, \"name\": \"/etc/pki\", > > \"start_time\": \"13:57:02.839911\", \"result\": true, \"duration\": > > 1.089, \"__run_num__\": 2, \"changes\": {}, \"__id__\": > > \"/etc/pki\"}, \"cmd_|-etcd_|-rm -rf > > /var/lib/etcd/*_|-run\": {\"comment\": \"Command \\\"rm -rf > > /var/lib/etcd/*\\\" run\", \"name\": \"rm -rf /var/lib/etcd/* > > \", \"start_time\": \"13:57:05.737534\", > > \"result\": true, \"duration\": 8.905, \"__run_num__\": 16, \"changes\": > > {\"pid\": 3150, \"retcode\": 0, \"stderr\": > > \"\", \"stdout\": \"\"}, \"__id__\": \"etcd\"}, > > \"iptables_|-etcd_|-etcd_|-append\": {\"comment\": \"Set iptables rule > > for etcd to: /usr/sbin/iptables --wait > > -t filter -A INPUT -p tcp -m state --state NEW -m multiport --dports > > 2379,2380,4001 --jump ACCEPT for ipv4\", \"name\": \"etcd\", > > \"start_time\": \"13:57:05. 500990\", > > \"result\": true, \"duration\": 103.789, \"__run_num__\": 14, > > \"changes\": {\"locale\": \"etcd\"}, \"__id__\": \"etcd\"}, > > \"x509_|-/etc/pki/minion.k > > ey_|-/etc/pki/minion.key_|-private_key_managed\": {\"comment\": \"File > > /etc/pki/minion.key updated\", \"pchanges\": {}, \"name\": > > \"/etc/pki/minion.key\", \"s > > tart_time\": \"13:57:02.870325\", \"result\": true, \"duration\": > > 1805.146, \"__run_num__\": 6, \"changes\": \"New private key > > generated\", \"__id__\": \"/etc > > /pki/minion.key\"}}}, \"out\": \"highstate\"}, \"__id__\": > > \"etcd_proxy_setup\"}, > > \"salt_|-kube_haproxy_setup_|-kube_haproxy_setup_|-state\": > > {\"comment\": \" One or more requisite > > failed: orch.kubernetes.kube_master_setup\", \"__run_num__\": 8, > > \"__sls__\": \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > > > > \"salt_|-mine_update_|-mine.update_|-function\": {\"comment\": > > \"Function ran successfully. Function mine.update ran on > > null-0050568c7c69.pfizer.com , ca, > > ppkl ablinux31.\", \"name\": > > \"mine.update\", \"start_time\": \"13:55:30.895706\", \"result\": true, > > \"duration\": 15215.053, \"__run_num__\": 0, \"__jid__\": \"20 > > 170418135531035630\", \"changes\": {\"ret\": > > {\"null-0050568c7c69.pfizer.com \": > > true, \"ca\": null, \"ppklablinux31\": true}, \"out\": \"highstate\"}, > > \"__id_ _\": \"mine_update\"}, > > \"salt_|-etcd_discovery_setup_|-etcd_discovery_setup_|-state\": > > {\"comment\": \"States ran successfully. Updating ppklablinux31.\", \"n > > ame\": \"etcd_discovery_setup\", > > \"start_time\": \"13:56:26.822228\", \"result\": true, \"duration\": > > 15283.009, \"__run_num__\": 3, \"__jid__\": \"2017041813 > > 5626951275\", \"changes\": {\"ret\": > > {\"ppklablinux31\": {\"cmd_|-set_size_|-curl -L -X PUT > > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/registry/k8s/_c > > onfig/size -d value=1_|-run\": {\"comment\": > > \"Command \\\"curl -L -X PUT > > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/ > registry/k8s/_config/size > > -d valu e=1\\\" run\", \"name\": \"curl > > -L -X PUT > > http://ppklablinux30.pfizer.com:2379/v2/keys/_etcd/ > registry/k8s/_config/size > > -d value=1\", \"start_time\": \"13:56:3 > > 1.855687\", \"result\": true, \"duration\": 80.902, \"__run_num__\": 4, > > \"changes\": {\"pid\": 3252, \"retcode\": 0, \"stderr\": \" % Total > > % Received % X ferd Average Speed > > Time Time Time Current\\n Dload > > Upload Total Spent Left Speed\\n\\r 0 0 0 0 > > 0 0 0 0 --:--:-- --:--:-- > > --:--:-- 0\\r100 121 100 114 100 7 7709 473 --:--:-- > > --:--:-- --:--:-- 8142\", \"stdout\": \"{ > > > > \\\"action\\\":\\\"set\\\",\\\"node\\\":{\\\"key\\\":\\\"/_ > etcd/registry/k8s/_config/size\\\",\\\"value\\\":\\\"1\\ > \",\\\"modifiedIndex\\\":6,\\\"createdIndex > > \\\":6}}\"}, \"__id__\": \"set_size\"}, > > \"pkg_|-cleanup_|-etcdctl_|-installed\": {\"comment\": \"Package etcdctl > > is already installed\", \"name\": \"etcdctl\" > > , \"start_time\": \"13:56:30.443368\", \"result\": true, > > \"duration\": 481.147, \"__run_num__\": 1, \"changes\": {}, \"__id__\": > > \"cleanup\"}, \"file_|-/etc/z > > ypp/repos.d/containers.repo_|-/etc/zypp/repos.d/containers. > repo_|-managed\": > > {\"comment\": \"File /etc/zypp/repos.d/containers.repo updated\", > > \"pchanges\": { }, \"name\": > > \"/etc/zypp/repos.d/containers.repo\", \"start_time\": > > \"13:56:27.452640\", \"result\": true, \"duration\": 196.93, > > \"__run_num__\": 0, \"changes \": > > {\"diff\": \"New file\", \"mode\": \"0644\"}, \"__id__\": > > \"/etc/zypp/repos.d/containers.repo\"}, > > \"pkg_|-set_size_|-curl_|-installed\": {\"comment\": \"P > > ackage curl is already installed\", \"name\": \"curl\", > > \"start_time\": \"13:56:31.841690\", \"result\": true, \"duration\": > > 13.602, \"__run_num__\": 3, \"cha > > nges\": {}, \"__id__\": \"set_size\"}, \"cmd_|-cleanup_|-etcdctl > > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > > /_etcd/registry/k8s_|-run\": {\"comment > > \": \"check_cmd determined the state succeeded\", \"name\": \"etcdctl > > --endpoint=http://ppklablinux30.pfizer.com:2379 rm -r > > /_etcd/registry/k8s\", \"start_tim e\": > > \"13:56:30.943924\", \"__id__\": \"cleanup\", \"duration\": 897.534, > > \"__run_num__\": 2, \"changes\": {\"pid\": 3246, \"retcode\": 4, > > \"stderr\": \"Error : dial tcp > > [::1]:2379: getsockopt: connection refused\", \"stdout\": \"\"}, > > \"result\": true}}}, \"out\": \"highstate\"}, \"__id__\": > > \"etcd_discovery_setup\ "}, > > \"salt_|-refresh_pillar_|-saltutil.refresh_pillar_|-function\": > > {\"comment\": \"Function ran successfully. Function > > saltutil.refresh_pillar ran on null-00 > > 50568c7c69.pfizer.com , ca, > > ppklablinux31.\", \"name\": \"saltutil.refresh_pillar\", \"start_time\": > > \"13:55:46.110938\", \"result\": true, \"duration\": 15249 > > .608, \"__run_num__\": 1, \"__jid__\": > > \"20170418135546241343\", \"changes\": {\"ret\": > > {\"null-0050568c7c69.pfizer.com \": > > true, \"ca\": true, \"ppklablinux31 \": > > true}, \"out\": \"highstate\"}, \"__id__\": \"refresh_pillar\"}, > > \"salt_|-etcd_nodes_setup_|-etcd_nodes_setup_|-state\": {\"comment\": > > \"States ran succes sfully.\", > > \"name\": \"etcd_nodes_setup\", \"start_time\": \"13:56:42.106031\", > > \"result\": true, \"duration\": 15283.737, \"__run_num__\": 4, > > \"changes\": {} , \"__id__\": > > \"etcd_nodes_setup\"}, > > \"salt_|-kube_minion_setup_|-kube_minion_setup_|-state\": {\"comment\": > > \"One or more requisite failed: orch.kubernetes.k > > ube_master_setup\", \"__run_num__\": 7, \"__sls__\": > > \"orch.kubernetes\", \"changes\": {}, \"result\": false}, > > \"salt_|-kube_nfs_setup_|-kube_nfs_setup_|-stat > > e\": {\"comment\": \"States ran successfully.\", \"name\": > > \"kube_nfs_setup\", \"start_time\": \"13:57:43.005316\", \"result\": > > true, \"duration\": 15395.687, > > \"__run_num__\": 9, \"changes\": {}, \"__id__\": \"kube_nfs_setup\"}}, > > \"retcode\": 1}}, \"success\": false, \"_stamp\": > > \"2017-04-18T13:57:58.404025\", \"us > > er\": \"saltapi\", \"fun\": > > \"runner.state.orchestrate\"}","alter_time":"2017-04-18T13: > 57:58.000Z","master_id":"ppklablinux30.localdomain_master","taken_at":" > > > > 2017-04-18T13:58:02.000Z","processed_at":"2017-04-18T13: > 58:02.000Z","worker_id":"worker1"},{"id":85,"tag":"key" > ,"data":"{\"_stamp\": > > \"2017-04-19T13:13:57.297 326\", > > \"rotate_aes_key\": > > true}","alter_time":"2017-04-19T13:13:57.000Z","master_id": > "ppklablinux30.localdomain_master","taken_at":"2017-04-19T13:13:59.000Z" > > > > ,"processed_at":"2017-04-19T13:13:59.000Z","worker_id":"worker1"}] > > ppklablinux30-010034246250:~ # > > > > On Wed, Apr 19, 2017 at 11:26 AM, Rafael Fern?ndez L?pez > > > wrote: > > > > Hello, > > > > On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > > > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > > > > > > > > > Installed each VM individually booting from the iso image, using > static > > > IP address, gateway and DNS for each. > > > > > > > > > > > > After build the CaaS installer comes up with an incorrect/wierd > hostname > > > for each system > > > > > > > > > > > > Admin: ppklablinux30.localdomain > > > > > > Master: ppklablinux31.localdomain > > > > > > Worker: null-0050568c7c69 > > > > Could you please login into the Admin node and provide the output of > the > > following commands? > > > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print > $1}') > > bundle exec rails runner "puts Pillar.all.to_json" > > > > and > > > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print > $1}') > > bundle exec rails runner "puts SaltEvent.all.to_json" > > > > > > Thank you, > > Rafael Fern?ndez L?pez. > > > > > > _______________________________________________ > > caasp-beta mailing list > > caasp-beta at lists.suse.com > > http://lists.suse.com/mailman/listinfo/caasp-beta > > > > > > > > > > > > -- > > Hari Mahadevan > > 914 564 2224 (c) > > 914 417 4292 (h) > > hari at mahadevan.net > > -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: From kukuk at suse.com Thu Apr 20 22:58:22 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Fri, 21 Apr 2017 06:58:22 +0200 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames In-Reply-To: References: <77f28473-2c63-56be-3919-c832f15442e1@suse.com> Message-ID: <20170421045822.GA10644@suse.com> On Thu, Apr 20, Hari Mahadevan wrote: > This issue with interfaces defaulting to DHCP needs get addressed, perhaps I > would not have seen this issue if my subnet didn't respond to DHCP requests, > but not in this case and should be fixed. This is fixed for the next Beta. -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From abonilla at suse.com Thu Apr 20 23:14:58 2017 From: abonilla at suse.com (Alejandro Bonilla) Date: Fri, 21 Apr 2017 05:14:58 +0000 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames Message-ID: <91c0fd0a-653d-43f4-970f-33d2c4ea046b@email.android.com> Hi Hari, On Apr 21, 2017 12:58 AM, Thorsten Kukuk wrote: On Thu, Apr 20, Hari Mahadevan wrote: > This issue with interfaces defaulting to DHCP needs get addressed, perhaps I > would not have seen this issue if my subnet didn't respond to DHCP requests, > but not in this case and should be fixed. When setting the network options, there is a 'set hostname via dhcp' box. Is that option not being respected? This is fixed for the next Beta. -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta -------------- next part -------------- An HTML attachment was scrubbed... URL: From hari at mahadevan.net Fri Apr 21 09:50:49 2017 From: hari at mahadevan.net (Hari Mahadevan) Date: Fri, 21 Apr 2017 11:50:49 -0400 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames In-Reply-To: <20170421045822.GA10644@suse.com> References: <77f28473-2c63-56be-3919-c832f15442e1@suse.com> <20170421045822.GA10644@suse.com> Message-ID: ok, thanks .. will wait for the next beta then.. is it still on track for 4/27 availability? On Fri, Apr 21, 2017 at 12:58 AM, Thorsten Kukuk wrote: > On Thu, Apr 20, Hari Mahadevan wrote: > > > This issue with interfaces defaulting to DHCP needs get addressed, > perhaps I > > would not have seen this issue if my subnet didn't respond to DHCP > requests, > > but not in this case and should be fixed. > > This is fixed for the next Beta. > > -- > Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP > SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany > GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG > Nuernberg) > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: From hari at mahadevan.net Fri Apr 21 11:33:11 2017 From: hari at mahadevan.net (Hari Mahadevan) Date: Fri, 21 Apr 2017 13:33:11 -0400 Subject: [caasp-beta] CaaS 1.0 beta2 Installer issues with hostnames In-Reply-To: <91c0fd0a-653d-43f4-970f-33d2c4ea046b@email.android.com> References: <91c0fd0a-653d-43f4-970f-33d2c4ea046b@email.android.com> Message-ID: Alejandro, The ?Set Hostname? via DHCP is not an option to select (its grayed out) when Static IPA is used. However this option is getting set anyway regardless of the installer setting. On Fri, Apr 21, 2017 at 1:14 AM, Alejandro Bonilla wrote: > Hi Hari, > > On Apr 21, 2017 12:58 AM, Thorsten Kukuk wrote: > > On Thu, Apr 20, Hari Mahadevan wrote: > > > This issue with interfaces defaulting to DHCP needs get addressed, > perhaps I > > would not have seen this issue if my subnet didn't respond to DHCP > requests, > > but not in this case and should be fixed. > > > When setting the network options, there is a 'set hostname via dhcp' box. > Is that option > not being respected? > > > This is fixed for the next Beta. > > -- > Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP > SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany > GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG > Nuernberg) > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > -- Hari Mahadevan 914 564 2224 (c) 914 417 4292 (h) hari at mahadevan.net -------------- next part -------------- An HTML attachment was scrubbed... URL: From rushi.ns at sap.com Tue Apr 25 12:31:03 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Tue, 25 Apr 2017 18:31:03 +0000 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server Message-ID: Hello we are behind proxy server to go internet. Right now I have issue that none of my applications are not active (PODs seems to be not getting created due to image retrieve since we have proxy (http://proxy:8080 ) to use internet. Does anyone have issues like us have proxy server to use ? if I have proxy how do I get applications working such as NGINX or whatever as status shows 0/1 always even the kubernetes dashboard is also failed? NAME READY STATUS RESTARTS AGE kube-loadbalancer-rc-43fbl 0/1 ImagePullBackOff 0 10d loadbalancer-daemon-k69zx 0/1 ImagePullBackOff 0 10d node-hello-3587361488-dlqlr 0/1 ImagePullBackOff 0 10d weave-cortex-agent-1559359561-p4qvm 0/1 ErrImagePull 0 14d Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/19/17, 5:26 PM, "caasp-beta-bounces at lists.suse.com on behalf of Rafael Fern?ndez L?pez" wrote: Hello, On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > Installed each VM individually booting from the iso image, using static > IP address, gateway and DNS for each. > > > > After build the CaaS installer comes up with an incorrect/wierd hostname > for each system > > > > Admin: ppklablinux30.localdomain > > Master: ppklablinux31.localdomain > > Worker: null-0050568c7c69 Could you please login into the Admin node and provide the output of the following commands? > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') bundle exec rails runner "puts Pillar.all.to_json" and > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') bundle exec rails runner "puts SaltEvent.all.to_json" Thank you, Rafael Fern?ndez L?pez. From robert.roland at suse.com Tue Apr 25 13:54:38 2017 From: robert.roland at suse.com (Robert Roland) Date: Tue, 25 Apr 2017 12:54:38 -0700 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: References: Message-ID: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> Hi there, Kubernetes pods can run behind a proxy, but this currently requires you to edit /etc/sysconfig/docker on each node, and add an entry for your proxy: HTTP_PROXY=http://proxy:8080 HTTPS_PROXY=http://proxy:8080 Replace the proxy URL accordingly. After this edit, restart the docker daemon with: sudo systemctl restart docker.service This will address the Docker daemon's ability to pull containers. As far as proxied Internet access within the containers themselves, you will need to add environment variables to the Kubernetes pod descriptors that add the HTTP_PROXY and HTTPS_PROXY and NO_PROXY variables accordingly. Using the Kubernetes guestbook example, you would add the following to the env section here: https://github.com/kubernetes/kubernetes/blob/master/examples/guestbook/frontend-deployment.yaml#L33 - name: HTTP_PROXY value: http://proxy:8080 - name: HTTPS_PROXY value: http://proxy:8080 - name: NO_PROXY value: 127.0.0.1,localhost,cluster.local In this example, the NO_PROXY is very important, along with the cluster.local entry so that services running within your container network are not proxied (using kube-dns for service discovery). We should improve this situation via configuration (but I can't commit to it!) as this will be a common scenario for enterprise customers. Hope this helps, Robert On 04/25/2017 11:31 AM, Ns, Rushi wrote: > Hello > > we are behind proxy server to go internet. Right now I have issue that none of my applications are not active (PODs seems to be not getting created due to image retrieve since we have proxy (http://proxy:8080 ) to use internet. > > Does anyone have issues like us have proxy server to use ? if I have proxy how do I get applications working such as NGINX or whatever as status shows 0/1 always even the kubernetes dashboard is also failed? > > > NAME READY STATUS RESTARTS AGE > kube-loadbalancer-rc-43fbl 0/1 ImagePullBackOff 0 10d > loadbalancer-daemon-k69zx 0/1 ImagePullBackOff 0 10d > node-hello-3587361488-dlqlr 0/1 ImagePullBackOff 0 10d > weave-cortex-agent-1559359561-p4qvm 0/1 ErrImagePull 0 14d > > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > On 4/19/17, 5:26 PM, "caasp-beta-bounces at lists.suse.com on behalf of Rafael Fern?ndez L?pez" wrote: > > Hello, > > On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > > > > > Installed each VM individually booting from the iso image, using static > > IP address, gateway and DNS for each. > > > > > > > > After build the CaaS installer comes up with an incorrect/wierd hostname > > for each system > > > > > > > > Admin: ppklablinux30.localdomain > > > > Master: ppklablinux31.localdomain > > > > Worker: null-0050568c7c69 > > Could you please login into the Admin node and provide the output of the > following commands? > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts Pillar.all.to_json" > > and > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts SaltEvent.all.to_json" > > > Thank you, > Rafael Fern?ndez L?pez. > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta From rushi.ns at sap.com Tue Apr 25 22:09:09 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Wed, 26 Apr 2017 04:09:09 +0000 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> Message-ID: <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> Hi Robert, Thanks I have done those already but nothing working except you mentioned ?cluster.local? which is missing. I will try this and let you know. As you mentioned you should try to provide that information during the installation or some sort of post-steps as all most all enterprise customers have proxy to go internet. You should try similar to what Redhat openshift container platform installation way they have a step where they ask the below proxy details during simple or advanced installation method. FYI, I have few clusters with openshift_container_platform and It works , whereas CAASP I am having issues ? ii have informed this to one of your engineer (Alejandro Bonilla) directly before asking the list community) . Anyways I will try adding the missing parameter and let you know my results. ==============Redhat Openshift Container Platform Installation step==================== If a proxy is needed to reach HTTP and HTTPS traffic please enter the name below. This proxy will be configured by default for all processes needing to reach systems outside the cluster. More advanced configuration is possible if using ansible directly: https://docs.openshift.com/enterprise/latest/install_config/http_proxies.html Specify your http proxy ? (ENTER for none) []: http://proxy.pal.sap.corp:8080 Specify your https proxy ? (ENTER for none) [http://proxy.pal.sap.corp:8080]: All hosts in your openshift inventory will automatically be added to the NO_PROXY value. Please provide any additional hosts to be added to NO_PROXY. (ENTER for none) []: *** Installation Summary *** ==============Redhat Openshift Container Platform Installation step==================== Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/25/17, 9:54 PM, "caasp-beta-bounces at lists.suse.com on behalf of Robert Roland" wrote: Hi there, Kubernetes pods can run behind a proxy, but this currently requires you to edit /etc/sysconfig/docker on each node, and add an entry for your proxy: HTTP_PROXY=http://proxy:8080 HTTPS_PROXY=http://proxy:8080 Replace the proxy URL accordingly. After this edit, restart the docker daemon with: sudo systemctl restart docker.service This will address the Docker daemon's ability to pull containers. As far as proxied Internet access within the containers themselves, you will need to add environment variables to the Kubernetes pod descriptors that add the HTTP_PROXY and HTTPS_PROXY and NO_PROXY variables accordingly. Using the Kubernetes guestbook example, you would add the following to the env section here: https://github.com/kubernetes/kubernetes/blob/master/examples/guestbook/frontend-deployment.yaml#L33 - name: HTTP_PROXY value: http://proxy:8080 - name: HTTPS_PROXY value: http://proxy:8080 - name: NO_PROXY value: 127.0.0.1,localhost,cluster.local In this example, the NO_PROXY is very important, along with the cluster.local entry so that services running within your container network are not proxied (using kube-dns for service discovery). We should improve this situation via configuration (but I can't commit to it!) as this will be a common scenario for enterprise customers. Hope this helps, Robert On 04/25/2017 11:31 AM, Ns, Rushi wrote: > Hello > > we are behind proxy server to go internet. Right now I have issue that none of my applications are not active (PODs seems to be not getting created due to image retrieve since we have proxy (http://proxy:8080 ) to use internet. > > Does anyone have issues like us have proxy server to use ? if I have proxy how do I get applications working such as NGINX or whatever as status shows 0/1 always even the kubernetes dashboard is also failed? > > > NAME READY STATUS RESTARTS AGE > kube-loadbalancer-rc-43fbl 0/1 ImagePullBackOff 0 10d > loadbalancer-daemon-k69zx 0/1 ImagePullBackOff 0 10d > node-hello-3587361488-dlqlr 0/1 ImagePullBackOff 0 10d > weave-cortex-agent-1559359561-p4qvm 0/1 ErrImagePull 0 14d > > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > On 4/19/17, 5:26 PM, "caasp-beta-bounces at lists.suse.com on behalf of Rafael Fern?ndez L?pez" wrote: > > Hello, > > On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > > > > > Installed each VM individually booting from the iso image, using static > > IP address, gateway and DNS for each. > > > > > > > > After build the CaaS installer comes up with an incorrect/wierd hostname > > for each system > > > > > > > > Admin: ppklablinux30.localdomain > > > > Master: ppklablinux31.localdomain > > > > Worker: null-0050568c7c69 > > Could you please login into the Admin node and provide the output of the > following commands? > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts Pillar.all.to_json" > > and > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts SaltEvent.all.to_json" > > > Thank you, > Rafael Fern?ndez L?pez. > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta From rushi.ns at sap.com Tue Apr 25 22:39:13 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Wed, 26 Apr 2017 04:39:13 +0000 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> Message-ID: <28AC98A4-41BB-46A6-B371-3D0197C970D6@sap.com> Hi Robert, What about this file. Do I have to add the same info. /etc/kubernetes # more proxy ### # kubernetes proxy config # default config should be adequate # Add your own! KUBE_PROXY_ARGS="\ --kubeconfig=/var/lib/kubelet/kubeconfig \ --proxy-mode=iptables \ \ --v=2" Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/26/17, 6:09 AM, "Ns, Rushi" wrote: Hi Robert, Thanks I have done those already but nothing working except you mentioned ?cluster.local? which is missing. I will try this and let you know. As you mentioned you should try to provide that information during the installation or some sort of post-steps as all most all enterprise customers have proxy to go internet. You should try similar to what Redhat openshift container platform installation way they have a step where they ask the below proxy details during simple or advanced installation method. FYI, I have few clusters with openshift_container_platform and It works , whereas CAASP I am having issues ? ii have informed this to one of your engineer (Alejandro Bonilla) directly before asking the list community) . Anyways I will try adding the missing parameter and let you know my results. ==============Redhat Openshift Container Platform Installation step==================== If a proxy is needed to reach HTTP and HTTPS traffic please enter the name below. This proxy will be configured by default for all processes needing to reach systems outside the cluster. More advanced configuration is possible if using ansible directly: https://docs.openshift.com/enterprise/latest/install_config/http_proxies.html Specify your http proxy ? (ENTER for none) []: http://proxy.pal.sap.corp:8080 Specify your https proxy ? (ENTER for none) [http://proxy.pal.sap.corp:8080]: All hosts in your openshift inventory will automatically be added to the NO_PROXY value. Please provide any additional hosts to be added to NO_PROXY. (ENTER for none) []: *** Installation Summary *** ==============Redhat Openshift Container Platform Installation step==================== Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/25/17, 9:54 PM, "caasp-beta-bounces at lists.suse.com on behalf of Robert Roland" wrote: Hi there, Kubernetes pods can run behind a proxy, but this currently requires you to edit /etc/sysconfig/docker on each node, and add an entry for your proxy: HTTP_PROXY=http://proxy:8080 HTTPS_PROXY=http://proxy:8080 Replace the proxy URL accordingly. After this edit, restart the docker daemon with: sudo systemctl restart docker.service This will address the Docker daemon's ability to pull containers. As far as proxied Internet access within the containers themselves, you will need to add environment variables to the Kubernetes pod descriptors that add the HTTP_PROXY and HTTPS_PROXY and NO_PROXY variables accordingly. Using the Kubernetes guestbook example, you would add the following to the env section here: https://github.com/kubernetes/kubernetes/blob/master/examples/guestbook/frontend-deployment.yaml#L33 - name: HTTP_PROXY value: http://proxy:8080 - name: HTTPS_PROXY value: http://proxy:8080 - name: NO_PROXY value: 127.0.0.1,localhost,cluster.local In this example, the NO_PROXY is very important, along with the cluster.local entry so that services running within your container network are not proxied (using kube-dns for service discovery). We should improve this situation via configuration (but I can't commit to it!) as this will be a common scenario for enterprise customers. Hope this helps, Robert On 04/25/2017 11:31 AM, Ns, Rushi wrote: > Hello > > we are behind proxy server to go internet. Right now I have issue that none of my applications are not active (PODs seems to be not getting created due to image retrieve since we have proxy (http://proxy:8080 ) to use internet. > > Does anyone have issues like us have proxy server to use ? if I have proxy how do I get applications working such as NGINX or whatever as status shows 0/1 always even the kubernetes dashboard is also failed? > > > NAME READY STATUS RESTARTS AGE > kube-loadbalancer-rc-43fbl 0/1 ImagePullBackOff 0 10d > loadbalancer-daemon-k69zx 0/1 ImagePullBackOff 0 10d > node-hello-3587361488-dlqlr 0/1 ImagePullBackOff 0 10d > weave-cortex-agent-1559359561-p4qvm 0/1 ErrImagePull 0 14d > > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > On 4/19/17, 5:26 PM, "caasp-beta-bounces at lists.suse.com on behalf of Rafael Fern?ndez L?pez" wrote: > > Hello, > > On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > > > > > Installed each VM individually booting from the iso image, using static > > IP address, gateway and DNS for each. > > > > > > > > After build the CaaS installer comes up with an incorrect/wierd hostname > > for each system > > > > > > > > Admin: ppklablinux30.localdomain > > > > Master: ppklablinux31.localdomain > > > > Worker: null-0050568c7c69 > > Could you please login into the Admin node and provide the output of the > following commands? > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts Pillar.all.to_json" > > and > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > bundle exec rails runner "puts SaltEvent.all.to_json" > > > Thank you, > Rafael Fern?ndez L?pez. > > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta From Ralf.Bueker at suse.com Wed Apr 26 08:16:55 2017 From: Ralf.Bueker at suse.com (Ralf Bueker) Date: Wed, 26 Apr 2017 14:16:55 +0000 Subject: [caasp-beta] salt-master rpm Message-ID: <1493216189.3876.13.camel@suse.com> Hi,? I am trying to install caasp Beta 2 from DVD.? As far as I understood ( I am not so sure if I did ... ) salt master should be installed on the admin node, installed first.? But it seems that does not happen.? There seem to be no salt master installed vm-casp-admin:/etc/salt # systemctl status salt-minion.service ? salt-minion.service - The Salt Minion ???Loaded: loaded (/usr/lib/systemd/system/salt-minion.service; disabled; vendor preset: disabled) ???Active: inactive (dead) vm-casp-admin:/etc/salt # systemctl status salt-master.service ? salt-master.service ???Loaded: not-found (Reason: No such file or directory) ???Active: inactive (dead) Also I did not find the salt-master rpm on the DVD.? rblaptop:/mnt/cd_iso # find -name salt* ./suse/x86_64/salt-2016.11.3-1.1.x86_64.rpm ./suse/x86_64/salt-minion-2016.11.3-1.1.x86_64.rpm? Please suggest.? kind regards Ralf From kukuk at suse.com Wed Apr 26 08:48:36 2017 From: kukuk at suse.com (Thorsten Kukuk) Date: Wed, 26 Apr 2017 16:48:36 +0200 Subject: [caasp-beta] salt-master rpm In-Reply-To: <1493216189.3876.13.camel@suse.com> References: <1493216189.3876.13.camel@suse.com> Message-ID: <20170426144836.GA6579@suse.com> On Wed, Apr 26, Ralf Bueker wrote: > Hi,? > > I am trying to install caasp Beta 2 from DVD.? > As far as I understood ( I am not so sure if I did ... ) salt master should be > installed on the admin node, installed first.? > > But it seems that does not happen.? Run "docker images" ;) The salt-master is inside a container Thorsten -- Thorsten Kukuk, Distinguished Engineer, Senior Architect SLES & CaaSP SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nuernberg, Germany GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nuernberg) From Ralf.Bueker at suse.com Wed Apr 26 09:07:16 2017 From: Ralf.Bueker at suse.com (Ralf Bueker) Date: Wed, 26 Apr 2017 15:07:16 +0000 Subject: [caasp-beta] salt-master rpm In-Reply-To: <20170426144836.GA6579@suse.com> References: <1493216189.3876.13.camel@suse.com> <20170426144836.GA6579@suse.com> Message-ID: <1493219221.3876.15.camel@suse.com> Found it... . Thanks ?:-) kind regards Ralf On Wed, 2017-04-26 at 16:48 +0200, Thorsten Kukuk wrote: > On Wed, Apr 26, Ralf Bueker wrote: > > > > > Hi,? > > > > I am trying to install caasp Beta 2 from DVD.? > > As far as I understood ( I am not so sure if I did ... ) salt master should > > be > > installed on the admin node, installed first.? > > > > But it seems that does not happen.? > > Run "docker images" ;) > > The salt-master is inside a container > > ? Thorsten > From robert.roland at suse.com Wed Apr 26 09:53:01 2017 From: robert.roland at suse.com (Robert Roland) Date: Wed, 26 Apr 2017 08:53:01 -0700 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <28AC98A4-41BB-46A6-B371-3D0197C970D6@sap.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> <28AC98A4-41BB-46A6-B371-3D0197C970D6@sap.com> Message-ID: <76138218-404c-897d-4400-c4cc5e83c5be@suse.com> No, this file can stay the same. The "kube-proxy" is used for Kubernetes service traffic coming into the cluster from external sources, or from nodes. It's unrelated to a Internet proxy. On 04/25/2017 09:39 PM, Ns, Rushi wrote: > Hi Robert, > > What about this file. Do I have to add the same info. > > /etc/kubernetes # more proxy > ### > # kubernetes proxy config > > # default config should be adequate > > # Add your own! > KUBE_PROXY_ARGS="\ > --kubeconfig=/var/lib/kubelet/kubeconfig \ > --proxy-mode=iptables \ > \ > --v=2" > > > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > On 4/26/17, 6:09 AM, "Ns, Rushi" wrote: > > Hi Robert, > > Thanks I have done those already but nothing working except you mentioned ?cluster.local? which is missing. I will try this and let you know. > > As you mentioned you should try to provide that information during the installation or some sort of post-steps as all most all enterprise customers have proxy to go internet. > > You should try similar to what Redhat openshift container platform installation way they have a step where they ask the below proxy details during simple or advanced installation method. > FYI, I have few clusters with openshift_container_platform and It works , whereas CAASP I am having issues ? ii have informed this to one of your engineer (Alejandro Bonilla) directly before asking the list community) . Anyways I will try adding the missing parameter and let you know my results. > > > > ==============Redhat Openshift Container Platform Installation step==================== > If a proxy is needed to reach HTTP and HTTPS traffic please enter the name below. > > This proxy will be configured by default for all processes needing to reach systems outside > > the cluster. > > More advanced configuration is possible if using ansible directly: > https://docs.openshift.com/enterprise/latest/install_config/http_proxies.html > Specify your http proxy ? (ENTER for none) []: http://proxy.pal.sap.corp:8080 > > Specify your https proxy ? (ENTER for none) [http://proxy.pal.sap.corp:8080]: > > All hosts in your openshift inventory will automatically be added to the NO_PROXY value. > > Please provide any additional hosts to be added to NO_PROXY. (ENTER for none) > > []: > > *** Installation Summary *** > ==============Redhat Openshift Container Platform Installation step==================== > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > On 4/25/17, 9:54 PM, "caasp-beta-bounces at lists.suse.com on behalf of Robert Roland" wrote: > > Hi there, > > Kubernetes pods can run behind a proxy, but this currently requires you > to edit /etc/sysconfig/docker on each node, and add an entry for your proxy: > > HTTP_PROXY=http://proxy:8080 > HTTPS_PROXY=http://proxy:8080 > > Replace the proxy URL accordingly. After this edit, restart the docker > daemon with: > > sudo systemctl restart docker.service > > This will address the Docker daemon's ability to pull containers. > > As far as proxied Internet access within the containers themselves, you > will need to add environment variables to the Kubernetes pod descriptors > that add the HTTP_PROXY and HTTPS_PROXY and NO_PROXY variables accordingly. > > Using the Kubernetes guestbook example, you would add the following to > the env section here: > https://github.com/kubernetes/kubernetes/blob/master/examples/guestbook/frontend-deployment.yaml#L33 > > - name: HTTP_PROXY > value: http://proxy:8080 > - name: HTTPS_PROXY > value: http://proxy:8080 > - name: NO_PROXY > value: 127.0.0.1,localhost,cluster.local > > In this example, the NO_PROXY is very important, along with the > cluster.local entry so that services running within your container > network are not proxied (using kube-dns for service discovery). > > We should improve this situation via configuration (but I can't commit > to it!) as this will be a common scenario for enterprise customers. > > Hope this helps, > > Robert > > On 04/25/2017 11:31 AM, Ns, Rushi wrote: > > Hello > > > > we are behind proxy server to go internet. Right now I have issue that none of my applications are not active (PODs seems to be not getting created due to image retrieve since we have proxy (http://proxy:8080 ) to use internet. > > > > Does anyone have issues like us have proxy server to use ? if I have proxy how do I get applications working such as NGINX or whatever as status shows 0/1 always even the kubernetes dashboard is also failed? > > > > > > NAME READY STATUS RESTARTS AGE > > kube-loadbalancer-rc-43fbl 0/1 ImagePullBackOff 0 10d > > loadbalancer-daemon-k69zx 0/1 ImagePullBackOff 0 10d > > node-hello-3587361488-dlqlr 0/1 ImagePullBackOff 0 10d > > weave-cortex-agent-1559359561-p4qvm 0/1 ErrImagePull 0 14d > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > > > > On 4/19/17, 5:26 PM, "caasp-beta-bounces at lists.suse.com on behalf of Rafael Fern?ndez L?pez" wrote: > > > > Hello, > > > > On 04/18/2017 04:27 PM, Mahadevan, Hari wrote: > > > Using 3 VMware VM?s 1xAdmin, 1xMaster, 1xWorker > > > > > > > > > > > > Installed each VM individually booting from the iso image, using static > > > IP address, gateway and DNS for each. > > > > > > > > > > > > After build the CaaS installer comes up with an incorrect/wierd hostname > > > for each system > > > > > > > > > > > > Admin: ppklablinux30.localdomain > > > > > > Master: ppklablinux31.localdomain > > > > > > Worker: null-0050568c7c69 > > > > Could you please login into the Admin node and provide the output of the > > following commands? > > > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > > bundle exec rails runner "puts Pillar.all.to_json" > > > > and > > > > > docker exec -it $(docker ps | grep velum-dashboard | awk '{print $1}') > > bundle exec rails runner "puts SaltEvent.all.to_json" > > > > > > Thank you, > > Rafael Fern?ndez L?pez. > > > > > > > > _______________________________________________ > > caasp-beta mailing list > > caasp-beta at lists.suse.com > > http://lists.suse.com/mailman/listinfo/caasp-beta > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > > > > > From Liam.McCafferty at smartodds.co.uk Wed Apr 26 11:01:54 2017 From: Liam.McCafferty at smartodds.co.uk (Liam McCafferty) Date: Wed, 26 Apr 2017 17:01:54 +0000 Subject: [caasp-beta] Ingress In-Reply-To: <1493219221.3876.15.camel@suse.com> References: <1493216189.3876.13.camel@suse.com> <20170426144836.GA6579@suse.com>,<1493219221.3876.15.camel@suse.com> Message-ID: <1493226114415.5983@smartodds.co.uk> Hi Guys, was wondering whats the best way to assign an IP to be used by ingress to round robin between containers, and what steps if any need to be taken after assigning this. Talking of ingress where exactly does this sit? on each of the Kube minions or on the master would this introduce a single point of failure? Cheers, Liam ______________________________________________________________________ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com ______________________________________________________________________ This e-mail and any files transmitted with it are confidential and may be legally privileged. If you receive it in error or are not the intended recipient you must not copy, distribute or take any action in reliance upon it. Instead, please notify us immediately by telephoning +44 (20) 74820223 and delete the material from your systems. Smartodds is a business carried on by Smartodds Limited, a company registered with the Registrar of Companies for England and Wales with number 05108548. Registered office: Unit 531 Highgate Studios, 53-79 Highgate Road, London NW5 1TL From rushi.ns at sap.com Wed Apr 26 12:59:34 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Wed, 26 Apr 2017 18:59:34 +0000 Subject: [caasp-beta] grafana, influxdb load balance bind-IP is not working Message-ID: <4619979F-A161-4E6E-921E-71E03007C209@sap.com> Hello I have deployed load balancer, grafana, influx db . pretty all active , grafana and influxbd wih load balancer (also kubernetes dashboard) . From cluster info output everything seems fine but I cannot get the access using browser (chrome, IE ) Kubernetes master is running at http://localhost:8080 Heapster is running at http://localhost:8080/api/v1/proxy/namespaces/kube-system/services/heapster monitoring-grafana is running at http://localhost:8080/api/v1/proxy/namespaces/kube-system/services/monitoring-grafana monitoring-influxdb is running at http://localhost:8080/api/v1/proxy/namespaces/kube-system/services/monitoring-influxdb NAME ENDPOINTS AGE heapster 172.20.92.2:8082 11d kube-controller-manager 21d kube-scheduler 21d kubernetes-dashboard 172.20.92.3:9090 11d monitoring-grafana 172.20.104.3:3000 11d monitoring-influxdb 172.20.104.2:8086 11d dashboard show bind-ip kubectl get configmap grafana-configmap-dashboard-svc -o yaml apiVersion: v1 data: bind-ip: 10.48.230.130 the IP seems acive (icmp responds) but http://10.48.230.130:8080/api/v1/proxy/namespaces/kube-system/services/monitoring-grafana is not working Any idea Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/26/17, 5:07 PM, "caasp-beta-bounces at lists.suse.com on behalf of Ralf Bueker" wrote: Found it... . Thanks :-) kind regards Ralf On Wed, 2017-04-26 at 16:48 +0200, Thorsten Kukuk wrote: > On Wed, Apr 26, Ralf Bueker wrote: > > > > > Hi, > > > > I am trying to install caasp Beta 2 from DVD. > > As far as I understood ( I am not so sure if I did ... ) salt master should > > be > > installed on the admin node, installed first. > > > > But it seems that does not happen. > > Run "docker images" ;) > > The salt-master is inside a container > > Thorsten > _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta From fcastelli at suse.com Thu Apr 27 08:49:15 2017 From: fcastelli at suse.com (Flavio Castelli) Date: Thu, 27 Apr 2017 16:49:15 +0200 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> Message-ID: On 04/26/2017 06:09 AM, Ns, Rushi wrote: > As you mentioned you should try to provide that information during the installation or some sort of post-steps as all most all enterprise customers have proxy to go internet. You are right, this is definitely something we should provide either during the installation time or when deploying the cluster from the web UI. I think Robert pointed you in the right direction, please let us know if the proposed solution is not working. Thanks for your feedback. Cheers Flavio From fcastelli at suse.com Thu Apr 27 09:12:56 2017 From: fcastelli at suse.com (Flavio Castelli) Date: Thu, 27 Apr 2017 17:12:56 +0200 Subject: [caasp-beta] How to add another worker node to an existing cluster In-Reply-To: References: Message-ID: On 04/14/2017 01:48 AM, Sun, Qiyan wrote: > How to add another worker node into an existing caasp cluster that was bootstrapped using the admin dashboard? Unfortunately this isn't currently supported. The feature will be introduced with a future release of CaaSP. Cheers Flavio From rushi.ns at sap.com Thu Apr 27 09:20:15 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Thu, 27 Apr 2017 15:20:15 +0000 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> Message-ID: <7EBB480F-68E3-47F4-92DD-651F73BE3FA3@sap.com> Hi Flavio, Yes I got information from Robert, however it wasn?t working ?? Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/27/17, 4:49 PM, "caasp-beta-bounces at lists.suse.com on behalf of Flavio Castelli" wrote: On 04/26/2017 06:09 AM, Ns, Rushi wrote: > As you mentioned you should try to provide that information during the installation or some sort of post-steps as all most all enterprise customers have proxy to go internet. You are right, this is definitely something we should provide either during the installation time or when deploying the cluster from the web UI. I think Robert pointed you in the right direction, please let us know if the proposed solution is not working. Thanks for your feedback. Cheers Flavio _______________________________________________ caasp-beta mailing list caasp-beta at lists.suse.com http://lists.suse.com/mailman/listinfo/caasp-beta From msabate at suse.com Fri Apr 28 03:19:17 2017 From: msabate at suse.com (Miquel =?utf-8?B?U2FiYXTDqSBTb2zDoA==?=) Date: Fri, 28 Apr 2017 11:19:17 +0200 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <7EBB480F-68E3-47F4-92DD-651F73BE3FA3@sap.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> <7EBB480F-68E3-47F4-92DD-651F73BE3FA3@sap.com> Message-ID: <87k264evoq.fsf@suse.com> Hello, I've just opened a ticket in our internal bugzilla. We are tracking this issue internally and working on it. That being said, to make it work manually you should follow this steps: 1. ssh to each machine in the cluster 2. create a systemd drop-in directory for the docker service: $ mkdir /etc/systemd/system/docker.service.d 3. create a file called /etc/systemd/system/docker.service.d/http-proxy.conf that adds the HTTP_PROXY environment variable: [Service] Environment="HTTP_PROXY=http://proxy.example.com:80/" 4. flush changes: $ sudo systemctl daemon-reload 5. verify that the configuration has been loaded: $ sudo systemctl show --property Environment docker Environment=HTTP_PROXY=http://proxy.example.com:80/ 6. restart Docker: $ sudo systemctl restart docker In the future we should ask the user about proxies in some "advanced configuration" option in YaST, pass it to the worker nodes through the autoyast.xml and set automatically the HTTP_PROXY for docker. Cheers, Ns @ 2017-04-27 15:20 GMT: > Hi Flavio, > > Yes I got information from Robert, however it wasn?t working ?? > > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A > DIFFERENCE > > > On 4/27/17, 4:49 PM, "caasp-beta-bounces at lists.suse.com on > behalf of Flavio Castelli" behalf of fcastelli at suse.com> wrote: > > On 04/26/2017 06:09 AM, Ns, Rushi wrote: > > As you mentioned you should try to provide that > > information during the installation or some sort of > > post-steps as all most all enterprise customers have proxy > > to go internet. > > You are right, this is definitely something we should > provide either > during the installation time or when deploying the cluster > from the web UI. > > I think Robert pointed you in the right direction, please > let us know if > the proposed solution is not working. > > Thanks for your feedback. > > Cheers > Flavio > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta -- Miquel Sabat? Sol?, PGP: 4096R / 1BA5 3C7A C93D CA2A CFDF DA97 96BE 8C6F D89D 6565 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 800 bytes Desc: not available URL: From rushi.ns at sap.com Fri Apr 28 03:56:11 2017 From: rushi.ns at sap.com (Ns, Rushi) Date: Fri, 28 Apr 2017 09:56:11 +0000 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <87k264evoq.fsf@suse.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> <7EBB480F-68E3-47F4-92DD-651F73BE3FA3@sap.com> <87k264evoq.fsf@suse.com> Message-ID: <48D737B6-DD80-4AA6-8BE5-932E533E5A5E@sap.com> Hi Miquel, Thanks, that solves some issues. How about HTTPS_PROXY as well NO_PROXY ? should we set those 2 parameters as well on the same file /etc/systemd/system/docker.service.d/http-proxy.conf? or not required ? Best Regards, Rushi. I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE On 4/28/17, 11:19 AM, "Miquel Sabat? Sol?" wrote: Hello, I've just opened a ticket in our internal bugzilla. We are tracking this issue internally and working on it. That being said, to make it work manually you should follow this steps: 1. ssh to each machine in the cluster 2. create a systemd drop-in directory for the docker service: $ mkdir /etc/systemd/system/docker.service.d 3. create a file called /etc/systemd/system/docker.service.d/http-proxy.conf that adds the HTTP_PROXY environment variable: [Service] Environment="HTTP_PROXY=http://proxy.example.com:80/" 4. flush changes: $ sudo systemctl daemon-reload 5. verify that the configuration has been loaded: $ sudo systemctl show --property Environment docker Environment=HTTP_PROXY=http://proxy.example.com:80/ 6. restart Docker: $ sudo systemctl restart docker In the future we should ask the user about proxies in some "advanced configuration" option in YaST, pass it to the worker nodes through the autoyast.xml and set automatically the HTTP_PROXY for docker. Cheers, Ns @ 2017-04-27 15:20 GMT: > Hi Flavio, > > Yes I got information from Robert, however it wasn?t working ?? > > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A > DIFFERENCE > > > On 4/27/17, 4:49 PM, "caasp-beta-bounces at lists.suse.com on > behalf of Flavio Castelli" behalf of fcastelli at suse.com> wrote: > > On 04/26/2017 06:09 AM, Ns, Rushi wrote: > > As you mentioned you should try to provide that > > information during the installation or some sort of > > post-steps as all most all enterprise customers have proxy > > to go internet. > > You are right, this is definitely something we should > provide either > during the installation time or when deploying the cluster > from the web UI. > > I think Robert pointed you in the right direction, please > let us know if > the proposed solution is not working. > > Thanks for your feedback. > > Cheers > Flavio > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta > > > _______________________________________________ > caasp-beta mailing list > caasp-beta at lists.suse.com > http://lists.suse.com/mailman/listinfo/caasp-beta -- Miquel Sabat? Sol?, PGP: 4096R / 1BA5 3C7A C93D CA2A CFDF DA97 96BE 8C6F D89D 6565 From vmoutoussamy at suse.com Fri Apr 28 04:06:08 2017 From: vmoutoussamy at suse.com (Vincent Moutoussamy) Date: Fri, 28 Apr 2017 12:06:08 +0200 Subject: [caasp-beta] Beta 3 will be released soon! Message-ID: Hi, Beta 3 of SUSE Container as a Service Platform was scheduled for yesterday, so as you can see we are a little bit late. However we are pumping download.suse.com so you can download our Beta 3 images, thus we should be able to officially announce Beta 3 really soon. Please stay tuned for the official release announcement. Sorry for the inconvenience, Regards, -- Vincent Moutoussamy SUSE Beta Program and SDK Project Manager From alvaro.saurin at suse.com Fri Apr 28 04:38:03 2017 From: alvaro.saurin at suse.com (Alvaro Saurin) Date: Fri, 28 Apr 2017 12:38:03 +0200 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <48D737B6-DD80-4AA6-8BE5-932E533E5A5E@sap.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> <7EBB480F-68E3-47F4-92DD-651F73BE3FA3@sap.com> <87k264evoq.fsf@suse.com> <48D737B6-DD80-4AA6-8BE5-932E533E5A5E@sap.com> Message-ID: <332d7f7b-3c29-39d5-aa00-3f29a288c2fe@suse.com> Hi there, When you are behind HTTP proxy, you can set the HTTP_PROXY (for HTTP traffic) and HTTPS_PROXY (for HTTPS traffic) environment variables for pointing to your proxy, so that all HTTP requests go through it. In the case of the Docker daemon, you can safely set these two variables to your proxy. If you want to bypass HTTP proxy for some specific destination (for example, if you have a private Docker registry installed in your local network) you can define HTTP proxy exceptions via "NO_PROXY" environment variable. In "NO_PROXY" variable, you specify a list of domain names or IP addresses for which HTTP proxy should not be used. Regards Alvaro On 04/28/2017 11:56 AM, Ns, Rushi wrote: > Hi Miquel, > > Thanks, that solves some issues. > > How about HTTPS_PROXY as well NO_PROXY ? should we set those 2 parameters as well on the same file /etc/systemd/system/docker.service.d/http-proxy.conf? or not required ? > > Best Regards, > > Rushi. > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A DIFFERENCE > > > On 4/28/17, 11:19 AM, "Miquel Sabat? Sol?" wrote: > > Hello, > > I've just opened a ticket in our internal bugzilla. We are > tracking this issue internally and working on it. That being said, > to make it work manually you should follow this steps: > > 1. ssh to each machine in the cluster > > 2. create a systemd drop-in directory for the docker service: > > $ mkdir /etc/systemd/system/docker.service.d > > 3. create a file called > /etc/systemd/system/docker.service.d/http-proxy.conf that adds the > HTTP_PROXY environment variable: > > [Service] > Environment="HTTP_PROXY=http://proxy.example.com:80/" > > 4. flush changes: > > $ sudo systemctl daemon-reload > > 5. verify that the configuration has been loaded: > > $ sudo systemctl show --property Environment docker > Environment=HTTP_PROXY=http://proxy.example.com:80/ > > 6. restart Docker: > > $ sudo systemctl restart docker > > In the future we should ask the user about proxies in some > "advanced configuration" option in YaST, pass it to the worker > nodes through the autoyast.xml and set automatically the > HTTP_PROXY for docker. > > Cheers, > > Ns @ 2017-04-27 15:20 GMT: > > > Hi Flavio, > > > > Yes I got information from Robert, however it wasn?t working ?? > > > > > > Best Regards, > > > > Rushi. > > I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A > > DIFFERENCE > > > > > > On 4/27/17, 4:49 PM, "caasp-beta-bounces at lists.suse.com on > > behalf of Flavio Castelli" > behalf of fcastelli at suse.com> wrote: > > > > On 04/26/2017 06:09 AM, Ns, Rushi wrote: > > > As you mentioned you should try to provide that > > > information during the installation or some sort of > > > post-steps as all most all enterprise customers have proxy > > > to go internet. > > > > You are right, this is definitely something we should > > provide either > > during the installation time or when deploying the cluster > > from the web UI. > > > > I think Robert pointed you in the right direction, please > > let us know if > > the proposed solution is not working. > > > > Thanks for your feedback. > > > > Cheers > > Flavio > > _______________________________________________ > > caasp-beta mailing list > > caasp-beta at lists.suse.com > > http://lists.suse.com/mailman/listinfo/caasp-beta > > > > > > _______________________________________________ > > caasp-beta mailing list > > caasp-beta at lists.suse.com > > http://lists.suse.com/mailman/listinfo/caasp-beta > > > -- > Miquel Sabat? Sol?, > PGP: 4096R / 1BA5 3C7A C93D CA2A CFDF DA97 96BE 8C6F D89D 6565 > > -- Alvaro Saurin Senior Software Engineer SUSE Linux GmbH, Maxfeldstr. 5, D-90409 N?rnberg Tel: +49-911-74053-0; Fax: +49-911-7417755; https://www.suse.com/ SUSE Linux GmbH, GF: Felix Imend?rffer, Jane Smithard, Graham Norton, HRB 21284 (AG N?rnberg) -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 473 bytes Desc: OpenPGP digital signature URL: From beta-programs at lists.suse.com Fri Apr 28 05:14:33 2017 From: beta-programs at lists.suse.com (SUSE Beta Program) Date: Fri, 28 Apr 2017 13:14:33 +0200 Subject: [caasp-beta] [ANNOUNCE] SUSE Container as a Service Platform 1.0 Beta 3 is available! Message-ID: <59032419e4e24_44ee131d31877942@par-dod7.mail> == [ANNOUNCE] SUSE Container as a Service Platform 1.0 Beta 3 is available! We are happy to announce our second public Beta of the SUSE Container as a Service Platform 1.0: Download[2] == New Bug fixing was one of our main focus for this release, however we are also happy to share the following addition: - We now support NTP for clock synchronization of all nodes, - In the One-Page-Installer you now can set one or more NTP server URLs, configuring ntpd, - A warning appears if you do not configure any NTP server URL. You can continue without naming a NTP server, but we do not recommend to do so. == Fixed - Running nodes without time synchronization caused issues on the cluster, so we are shipping a ntpd that is configured during the One-Page-Installation, providing one or more NTP server URLs, - kubectl config can now be downloaded also after restarting the cluster, - docker, kubelet and etcd on the administration node are now enabled by the system role, so their systemctl commands have been removed from the activate.sh script - [bsc#1032651], - After changing the IP of the dashboard/admin note, workers were still trying to connect to the old IP of the dashboard/admin node - [bsc#1031605], - Various typos - [bsc#1031685]. == Things to consider for this Beta: DHCP Your DHCP server should provide resolveable hostnames. If this is not the case like with libvirt/KVM, you should consider providing one yourself by appending this kernel parameter "hostname=HOSTNAME" during installation. However, the kubeconfig file downloaded from the Dashboard could contain an incorrect "server" hostname that should be replaced with the IP address of your Master. For more information read: https://en.opensuse.org/SDB:Linuxrc#Network_Configuration Autoyast/VMX-Images If you install via autoyast or one of the provided VMX beta images (KVM,Xen,VMware,...) please set a password or SSH key via cloud-init to be able to login. Release schedule[3] Release Notes[4] Documentation[5] Have fun beta testing! Your SUSE Linux Enterprise Team Please refer to our dedicated SUSE CaaSP Beta Program webpage[1] for any general information. However, do not hesitate to contact us at beta-programs at lists.suse.com if you have any questions. You received this email because you're signed up to get updates from us. Please send an email to beta-programs at lists.suse.com if you want to unsubscribe. [1]https://www.suse.com/betaprogram/caasp-beta [2]https://www.suse.com/betaprogram/caasp-beta/#download [3]https://www.suse.com/betaprogram/caasp-beta/#releases [4]https://www.suse.com/betaprogram/caasp-beta/#releasenotes [5]https://www.suse.com/betaprogram/caasp-beta/#documentation -------------- next part -------------- An HTML attachment was scrubbed... URL: From robert.roland at suse.com Fri Apr 28 10:09:29 2017 From: robert.roland at suse.com (Robert Roland) Date: Fri, 28 Apr 2017 09:09:29 -0700 Subject: [caasp-beta] CaaS 1.0 beta2 pods issues with behind proxy server In-Reply-To: <87k264evoq.fsf@suse.com> References: <2f61573e-3c5e-69c5-be9d-98a86c11db42@suse.com> <06D6B1A5-74ED-4BFC-9AB1-447FD5F536ED@sap.com> <7EBB480F-68E3-47F4-92DD-651F73BE3FA3@sap.com> <87k264evoq.fsf@suse.com> Message-ID: <0DB04740-33B8-417B-A31A-854D490F5B09@suse.com> That shouldn't be necessary because our default Docker systemd uses /etc/default/docker as an EnvironmentFile? On April 28, 2017 2:19:17 AM PDT, "Miquel Sabat? Sol?" wrote: >Hello, > >I've just opened a ticket in our internal bugzilla. We are >tracking this issue internally and working on it. That being said, >to make it work manually you should follow this steps: > >1. ssh to each machine in the cluster > >2. create a systemd drop-in directory for the docker service: > > $ mkdir /etc/systemd/system/docker.service.d > >3. create a file called >/etc/systemd/system/docker.service.d/http-proxy.conf that adds the >HTTP_PROXY environment variable: > > [Service] > Environment="HTTP_PROXY=http://proxy.example.com:80/" > >4. flush changes: > > $ sudo systemctl daemon-reload > >5. verify that the configuration has been loaded: > > $ sudo systemctl show --property Environment docker > Environment=HTTP_PROXY=http://proxy.example.com:80/ > >6. restart Docker: > > $ sudo systemctl restart docker > >In the future we should ask the user about proxies in some >"advanced configuration" option in YaST, pass it to the worker >nodes through the autoyast.xml and set automatically the >HTTP_PROXY for docker. > >Cheers, > >Ns @ 2017-04-27 15:20 GMT: > >> Hi Flavio, >> >> Yes I got information from Robert, however it wasn?t working ?? >> >> >> Best Regards, >> >> Rushi. >> I MAY BE ONLY ONE PERSON, BUT I CAN BE ONE PERSON WHO MAKES A >> DIFFERENCE >> >> >> On 4/27/17, 4:49 PM, "caasp-beta-bounces at lists.suse.com on >> behalf of Flavio Castelli" > behalf of fcastelli at suse.com> wrote: >> >> On 04/26/2017 06:09 AM, Ns, Rushi wrote: >> > As you mentioned you should try to provide that >> > information during the installation or some sort of >> > post-steps as all most all enterprise customers have proxy >> > to go internet. >> >> You are right, this is definitely something we should >> provide either >> during the installation time or when deploying the cluster >> from the web UI. >> >> I think Robert pointed you in the right direction, please >> let us know if >> the proposed solution is not working. >> >> Thanks for your feedback. >> >> Cheers >> Flavio >> _______________________________________________ >> caasp-beta mailing list >> caasp-beta at lists.suse.com >> http://lists.suse.com/mailman/listinfo/caasp-beta >> >> >> _______________________________________________ >> caasp-beta mailing list >> caasp-beta at lists.suse.com >> http://lists.suse.com/mailman/listinfo/caasp-beta > > >-- >Miquel Sabat? Sol?, >PGP: 4096R / 1BA5 3C7A C93D CA2A CFDF DA97 96BE 8C6F D89D 6565 -------------- next part -------------- An HTML attachment was scrubbed... URL: