+ export WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-k8s-1.10.3-release + WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-k8s-1.10.3-release + [[ k8s-1.10.3-release =~ openshift-.* ]] + [[ k8s-1.10.3-release =~ .*-1.9.3-.* ]] + export KUBEVIRT_PROVIDER=k8s-1.10.3 + KUBEVIRT_PROVIDER=k8s-1.10.3 + export KUBEVIRT_NUM_NODES=2 + KUBEVIRT_NUM_NODES=2 + export NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + export NAMESPACE=kube-system + NAMESPACE=kube-system + trap '{ make cluster-down; }' EXIT SIGINT SIGTERM SIGSTOP + make cluster-down ./cluster/down.sh + make cluster-up ./cluster/up.sh Downloading ....... Downloading ....... Downloading ....... 2018/06/27 10:43:44 Waiting for host: 192.168.66.101:22 2018/06/27 10:43:47 Problem with dial: dial tcp 192.168.66.101:22: getsockopt: no route to host. Sleeping 5s 2018/06/27 10:43:55 Problem with dial: dial tcp 192.168.66.101:22: getsockopt: no route to host. Sleeping 5s 2018/06/27 10:44:00 Connected to tcp://192.168.66.101:22 + kubeadm init --config /etc/kubernetes/kubeadm.conf [init] Using Kubernetes version: v1.10.3 [init] Using Authorization modes: [Node RBAC] [preflight] Running pre-flight checks. [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl Flag --admission-control has been deprecated, Use --enable-admission-plugins or --disable-admission-plugins instead. Will be removed in a future version. [certificates] Generated ca certificate and key. [certificates] Generated apiserver certificate and key. [certificates] apiserver serving cert is signed for DNS names [node01 kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 192.168.66.101] [certificates] Generated apiserver-kubelet-client certificate and key. [certificates] Generated etcd/ca certificate and key. [certificates] Generated etcd/server certificate and key. [certificates] etcd/server serving cert is signed for DNS names [localhost] and IPs [127.0.0.1] [certificates] Generated etcd/peer certificate and key. [certificates] etcd/peer serving cert is signed for DNS names [node01] and IPs [192.168.66.101] [certificates] Generated etcd/healthcheck-client certificate and key. [certificates] Generated apiserver-etcd-client certificate and key. [certificates] Generated sa key and public key. [certificates] Generated front-proxy-ca certificate and key. [certificates] Generated front-proxy-client certificate and key. [certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf" [controlplane] Wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/manifests/kube-apiserver.yaml" [controlplane] Wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/manifests/kube-controller-manager.yaml" [controlplane] Wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/manifests/kube-scheduler.yaml" [etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/manifests/etcd.yaml" [init] Waiting for the kubelet to boot up the control plane as Static Pods from directory "/etc/kubernetes/manifests". [init] This might take a minute or longer if the control plane images have to be pulled. [apiclient] All control plane components are healthy after 30.011033 seconds [uploadconfig] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace [markmaster] Will mark node node01 as master by adding a label and a taint [markmaster] Master node01 tainted and labelled with key/value: node-role.kubernetes.io/master="" [bootstraptoken] Using token: abcdef.1234567890123456 [bootstraptoken] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials [bootstraptoken] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token [bootstraptoken] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster [bootstraptoken] Creating the "cluster-info" ConfigMap in the "kube-public" namespace [addons] Applied essential addon: kube-dns [addons] Applied essential addon: kube-proxy Your Kubernetes master has initialized successfully! To start using your cluster, you need to run the following as a regular user: mkdir -p $HOME/.kube sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config sudo chown $(id -u):$(id -g) $HOME/.kube/config You should now deploy a pod network to the cluster. Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at: https://kubernetes.io/docs/concepts/cluster-administration/addons/ You can now join any number of machines by running the following on each node as root: kubeadm join 192.168.66.101:6443 --token abcdef.1234567890123456 --discovery-token-ca-cert-hash sha256:886e3d6fd13d2c6f0c22d9a30f2fe66046a7cd3c46dca227570115236c344ee5 + kubectl --kubeconfig=/etc/kubernetes/admin.conf apply -f https://raw.githubusercontent.com/coreos/flannel/v0.9.1/Documentation/kube-flannel.yml clusterrole.rbac.authorization.k8s.io "flannel" created clusterrolebinding.rbac.authorization.k8s.io "flannel" created serviceaccount "flannel" created configmap "kube-flannel-cfg" created daemonset.extensions "kube-flannel-ds" created + kubectl --kubeconfig=/etc/kubernetes/admin.conf taint nodes node01 node-role.kubernetes.io/master:NoSchedule- node "node01" untainted 2018/06/27 10:44:47 Waiting for host: 192.168.66.102:22 2018/06/27 10:44:50 Problem with dial: dial tcp 192.168.66.102:22: getsockopt: no route to host. Sleeping 5s 2018/06/27 10:44:58 Problem with dial: dial tcp 192.168.66.102:22: getsockopt: no route to host. Sleeping 5s 2018/06/27 10:45:03 Problem with dial: dial tcp 192.168.66.102:22: getsockopt: connection refused. Sleeping 5s 2018/06/27 10:45:08 Connected to tcp://192.168.66.102:22 + kubeadm join --token abcdef.1234567890123456 192.168.66.101:6443 --ignore-preflight-errors=all --discovery-token-unsafe-skip-ca-verification=true [preflight] Running pre-flight checks. [discovery] Trying to connect to API Server "192.168.66.101:6443" [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl [discovery] Created cluster-info discovery client, requesting info from "https://192.168.66.101:6443" [discovery] Cluster info signature and contents are valid and no TLS pinning was specified, will use API Server "192.168.66.101:6443" [discovery] Successfully established connection with API Server "192.168.66.101:6443" This node has joined the cluster: * Certificate signing request was sent to master and a response was received. * The Kubelet was informed of the new secure connection details. Run 'kubectl get nodes' on the master to see this node join the cluster. Sending file modes: C0755 39588992 kubectl Sending file modes: C0600 5454 admin.conf Cluster "kubernetes" set. Cluster "kubernetes" set. + set +e + kubectl get nodes --no-headers + cluster/kubectl.sh get nodes --no-headers node01 Ready master 50s v1.10.3 node02 NotReady 10s v1.10.3 + kubectl_rc=0 + '[' 0 -ne 0 ']' ++ kubectl get nodes --no-headers ++ grep NotReady ++ cluster/kubectl.sh get nodes --no-headers + '[' -n '' ']' + set -e + echo 'Nodes are ready:' Nodes are ready: + kubectl get nodes + cluster/kubectl.sh get nodes NAME STATUS ROLES AGE VERSION node01 Ready master 52s v1.10.3 node02 Ready 12s v1.10.3 + make cluster-sync ./cluster/build.sh Building ... Untagged: localhost:38186/kubevirt/virt-controller:devel Untagged: localhost:38186/kubevirt/virt-controller@sha256:78f7669027f8e7992e9b3a5db8a7a8abe42d709ef8a7f92a93249adeb8ec60d2 Deleted: sha256:40762f7abffa9cdfc2cb931e1cdc9541e802ada627049377c8c9a54974d97e60 Deleted: sha256:f08ee3f9c6126701488c1c44f654b2448e02616a10625bd5b386c16d6ee7409d Deleted: sha256:95cd894d0e1010d31788777c84c4325d8bbd0767a23ab9833a8d1e79d6f8dc06 Deleted: sha256:582038213c64c560b20d5c62a228abb12cf63a2445441d68d8d7cb86bf22543c Untagged: localhost:38186/kubevirt/virt-launcher:devel Untagged: localhost:38186/kubevirt/virt-launcher@sha256:bd442b2aa8fdf6ce8af26eafbf4c07cc2ad7edd6cb50acf0cf798bd594cd555d Deleted: sha256:60c403cc55b8e2ecfd579175ddd9069296881f541fcb86d1e4db979616af75a8 Deleted: sha256:12d3a44f272a94005430048556d7ca18538637a67e412d930b4c976bf15afdd1 Deleted: sha256:8d6d544d17d2729785806897af80c0af2d2e8367c12d554a09bc31692975354f Deleted: sha256:8f43e3b127e587a27e7f89227670a3e43f36ee7e71dfb7e14dfde697ba54187b Deleted: sha256:946811aec8e00a6b724302e42e649dd5033747e2519810d2480d31e7da06e025 Deleted: sha256:6d184ad917a85a4a6df992948d52b5979e96e8913daf136ff8b0606f9c42967e Deleted: sha256:b0be2a70bfad42d56a4bcf8ad23ac69aa57c806590887ca39b603af586a1c52a Deleted: sha256:5cfb906a6a487fbe5882d03e72f1cfaf61e830775eeef8ba04647bb9bd826293 Deleted: sha256:d96b4c5872db33f6df48ccb5891933f2c703be2337d724e514e7e4fe34a08dac Deleted: sha256:9fe43556149d415180178777fd41234e3ae5ecf26f30b94061d601043213ced0 Deleted: sha256:6adaccde746270504d9c482293b3c6fb354ae1a27bd7736f6fc26c26de441b68 Deleted: sha256:fd40ec069e02a99dd67e84bbdcdc9c91b8abdafa03abfbc6d80d933ac8178f42 Deleted: sha256:0480dbbc79de6ced84b9d7a1658e5ebb336cee327dd821488442101de64cccac Deleted: sha256:5f4e8163a2abca7cd4cb7c68e3a90f8c3be90d74d0f191bbbcc2c9aa513e0cc1 Deleted: sha256:733c25b8f5d021c70aba8ec1ae9a896ec7cdcde1faec3a3acf908a0cc827fb9b Deleted: sha256:5e59b833efa2e2ddb4fe2a36215bb48305f25be679b6a27914aa0a083e05da61 Untagged: localhost:38186/kubevirt/virt-handler:devel Untagged: localhost:38186/kubevirt/virt-handler@sha256:0335f13036c55b10a4365b0d09509456a3984f1b7ec707ccde4123060ee1a26b Deleted: sha256:e4b283ee445020cde7757fcb63ed1e86bc249e4dc891910a4cf30384f10c6544 Deleted: sha256:0b2e86cb9944dd6f2c9115eb2d8bf6c6fc2c9a8b1f20b187aebad7f6c2300b19 Deleted: sha256:036f0a735d96bd7fc17abba089baba7bc6b64b5f2d65806522a4f02304437d35 Deleted: sha256:e8fe17a586da730334a1f6eeb2ec543534061f341d7e36159620745248d53878 Untagged: localhost:38186/kubevirt/virt-api:devel Untagged: localhost:38186/kubevirt/virt-api@sha256:ea3f8119e5c36ed760cfb206352e19e85ea29ea69022f85b279c315891d0702a Deleted: sha256:cc97269bcc31b60bc820228fd602fbab4be8bb34999bfcfa4e17d24046579d79 Deleted: sha256:4d96c4ed7eb1cd828fba776423b343b078d37729bfec68372b10e433f859d580 Deleted: sha256:3d3fb981f5752cefebcc3d86764343734ca299ce4368713246c1b78de233a569 Deleted: sha256:c024d4b2bc00d7b42bfac1a40b80cdfe7c9823c90381c6b8c33bd91f508aedf6