Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1195798 Details for
Bug 1371464
[GCE]deployer status is error when DYNAMICALLY_PROVISION_STORAGE is 'true'
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
logs
20160830.log (text/plain), 21.21 KB, created by
Peng Li
on 2016-08-30 09:19:03 UTC
(
hide
)
Description:
logs
Filename:
MIME Type:
Creator:
Peng Li
Created:
2016-08-30 09:19:03 UTC
Size:
21.21 KB
patch
obsolete
>[penli@dhcp-137-185 33]$ ./deploy_metrics.sh >Already on project "openshift-infra" on server "https://104.155.174.187:8443". >serviceaccount "metrics-deployer" created >secret/metrics-deployer >--> Deploying template "metrics-deployer-template" in project "openshift" > > metrics-deployer-template > --------- > Template for deploying the required Metrics integration. Requires cluster-admin 'metrics-deployer' service account and 'metrics-deployer' secret. > > * With parameters: > * IMAGE_PREFIX=registry.ops.openshift.com/openshift3/ > * IMAGE_VERSION=3.3.0 > * MASTER_URL=https://104.155.174.187:8443 > * HAWKULAR_METRICS_HOSTNAME=hawkular-metrics.0830-u3v.qe.rhcloud.com > * MODE=deploy > * REDEPLOY=false > * IGNORE_PREFLIGHT=false > * USE_PERSISTENT_STORAGE=true > * DYNAMICALLY_PROVISION_STORAGE=true > * CASSANDRA_NODES=1 > * CASSANDRA_PV_SIZE=10 > * METRIC_DURATION=7 > * USER_WRITE_ACCESS=false > * HEAPSTER_NODE_ID=nodename > * METRIC_RESOLUTION=15s > >--> Creating resources with label app=metrics-deployer-template ... > pod "metrics-deployer-4wheq" created >--> Success > Run 'oc status' to view your app. > >[penli@dhcp-137-185 33]$ oc get po >NAME READY STATUS RESTARTS AGE >hawkular-cassandra-1-bi7nk 1/1 Running 0 1m >hawkular-metrics-t5bxo 1/1 Running 0 1m >heapster-qz34g 1/1 Running 0 1m >metrics-deployer-4wheq 0/1 Error 0 1m > > >[penli@dhcp-137-185 33]$ oc logs metrics-deployer-4wheq >+ deployer_mode=deploy >+ image_prefix=registry.ops.openshift.com/openshift3/ >+ image_version=3.3.0 >+ master_url=https://104.155.174.187:8443 >+ [[ 3 == \/ ]] >++ parse_bool false REDEPLOY >++ local v=false >++ '[' false '!=' true -a false '!=' false ']' >++ echo false >+ redeploy=false >+ '[' false == true ']' >+ mode=deploy >+ '[' deploy = redeploy ']' >++ parse_bool false IGNORE_PREFLIGHT >++ local v=false >++ '[' false '!=' true -a false '!=' false ']' >++ echo false >+ ignore_preflight=false >+ cassandra_nodes=1 >++ parse_bool true USE_PERSISTENT_STORAGE >++ local v=true >++ '[' true '!=' true -a true '!=' false ']' >++ echo true >+ use_persistent_storage=true >++ parse_bool true DYNAMICALLY_PROVISION_STORAGE >++ local v=true >++ '[' true '!=' true -a true '!=' false ']' >++ echo true >+ dynamically_provision_storage=true >+ cassandra_pv_size=10 >+ metric_duration=7 >+ user_write_access=false >+ heapster_node_id=nodename >+ metric_resolution=15s >+ project=openshift-infra >+ master_ca=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt >+ token_file=/var/run/secrets/kubernetes.io/serviceaccount/token >+ dir=/etc/deploy/_output >+ secret_dir=/secret >+ rm -rf /etc/deploy/_output >+ mkdir -p /etc/deploy/_output >+ chmod 700 /etc/deploy/_output >+ mkdir -p /secret >+ chmod 700 /secret >chmod: changing permissions of '/secret': Read-only file system >+ : >+ hawkular_metrics_hostname=hawkular-metrics.0830-u3v.qe.rhcloud.com >+ hawkular_metrics_alias=hawkular-metrics >+ hawkular_cassandra_alias=hawkular-cassandra >++ date +%s >+ openshift admin ca create-signer-cert --key=/etc/deploy/_output/ca.key --cert=/etc/deploy/_output/ca.crt --serial=/etc/deploy/_output/ca.serial.txt --name=metrics-signer@1472541757 >+ '[' -n 1 ']' >+ oc config set-cluster master --api-version=v1 --certificate-authority=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt --server=https://104.155.174.187:8443 >cluster "master" set. >++ cat /var/run/secrets/kubernetes.io/serviceaccount/token >+ oc config set-credentials account --token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.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.RBrQ-yapeKTOrBBc_-ZN0q87Ag_hYagvWf3iUfjJiM6dPoo1ejC-CN9khrqtkBlesdH1kti0qP0k_BW8A4PrcKcq0WzREPwCCLHHJvynq-YUf9g0c45NnURbok56WwGH0IPZHTN9FKVHNszD1qApKudNoCC4iXHnnnOyZ58wFF0KPuEokQRRTnnhG3HCsc5pDz1wXD6Ga7CbONFnMEoqdg3NSUx0XzzRdhE6n5kiA6EtoDD6-gxzxk8UReEHw-C5ciACkLuewsqSNQ2_FOupLXF5C31543lCaMvFZExgPb9TKImneunD2HNHCnq2lEwWN2-wqQQOawZFDf14CXYhbw >user "account" set. >+ oc config set-context current --cluster=master --user=account --namespace=openshift-infra >context "current" set. >+ oc config use-context current >switched to context "current". >+ old_kc=/etc/deploy/.kubeconfig >+ KUBECONFIG=/etc/deploy/_output/kube.conf >+ '[' -z 1 ']' >+ oc config set-cluster deployer-master --api-version=v1 --certificate-authority=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt --server=https://104.155.174.187:8443 >cluster "deployer-master" set. >++ cat /var/run/secrets/kubernetes.io/serviceaccount/token >+ oc config set-credentials deployer-account --token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.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.RBrQ-yapeKTOrBBc_-ZN0q87Ag_hYagvWf3iUfjJiM6dPoo1ejC-CN9khrqtkBlesdH1kti0qP0k_BW8A4PrcKcq0WzREPwCCLHHJvynq-YUf9g0c45NnURbok56WwGH0IPZHTN9FKVHNszD1qApKudNoCC4iXHnnnOyZ58wFF0KPuEokQRRTnnhG3HCsc5pDz1wXD6Ga7CbONFnMEoqdg3NSUx0XzzRdhE6n5kiA6EtoDD6-gxzxk8UReEHw-C5ciACkLuewsqSNQ2_FOupLXF5C31543lCaMvFZExgPb9TKImneunD2HNHCnq2lEwWN2-wqQQOawZFDf14CXYhbw >user "deployer-account" set. >+ oc config set-context deployer-context --cluster=deployer-master --user=deployer-account --namespace=openshift-infra >context "deployer-context" set. >+ '[' -n 1 ']' >+ oc config use-context deployer-context >switched to context "deployer-context". >+ case $deployer_mode in >+ '[' false '!=' true ']' >+ validate_preflight >+ set -e >+ set +x > >PREFLIGHT CHECK SUCCEEDED >validate_master_accessible: ok >validate_hostname: The HAWKULAR_METRICS_HOSTNAME value is deemed acceptable. >validate_deployer_secret: ok >+ setup_certificate hawkular-metrics hawkular-metrics,hawkular-metrics.0830-u3v.qe.rhcloud.com '' >+ local name=hawkular-metrics >+ local hostnames=hawkular-metrics,hawkular-metrics.0830-u3v.qe.rhcloud.com >+ local envVar= >+ openshift admin ca create-server-cert --key=/etc/deploy/_output/hawkular-metrics.key --cert=/etc/deploy/_output/hawkular-metrics.crt --hostnames=hawkular-metrics,hawkular-metrics.0830-u3v.qe.rhcloud.com --signer-cert=/etc/deploy/_output/ca.crt --signer-key=/etc/deploy/_output/ca.key --signer-serial=/etc/deploy/_output/ca.serial.txt >+ cat /etc/deploy/_output/hawkular-metrics.key /etc/deploy/_output/hawkular-metrics.crt >+ cp /etc/deploy/_output/ca.crt /etc/deploy/_output/hawkular-metrics-ca.cert >+ setup_certificate hawkular-cassandra hawkular-cassandra '' >+ local name=hawkular-cassandra >+ local hostnames=hawkular-cassandra >+ local envVar= >+ openshift admin ca create-server-cert --key=/etc/deploy/_output/hawkular-cassandra.key --cert=/etc/deploy/_output/hawkular-cassandra.crt --hostnames=hawkular-cassandra --signer-cert=/etc/deploy/_output/ca.crt --signer-key=/etc/deploy/_output/ca.key --signer-serial=/etc/deploy/_output/ca.serial.txt >+ cat /etc/deploy/_output/hawkular-cassandra.key /etc/deploy/_output/hawkular-cassandra.crt >+ cp /etc/deploy/_output/ca.crt /etc/deploy/_output/hawkular-cassandra-ca.cert >+ echo 'Generating randomized passwords for the Hawkular Metrics and Cassandra keystores and truststores' >Generating randomized passwords for the Hawkular Metrics and Cassandra keystores and truststores >++ cat /dev/urandom >++ head -c15 >++ tr -dc _A-Z-a-z-0-9 >+ hawkular_metrics_keystore_password=Di8ffWoQmyUP3o9 >++ cat /dev/urandom >++ tr -dc _A-Z-a-z-0-9 >++ head -c15 >+ hawkular_metrics_truststore_password=qc1cwWp2zcjiei9 >++ cat /dev/urandom >++ tr -dc _A-Z-a-z-0-9 >++ head -c15 >+ hawkular_cassandra_keystore_password=hInxtHjw3EKjkr- >++ cat /dev/urandom >++ tr -dc _A-Z-a-z-0-9 >++ head -c15 >+ hawkular_cassandra_truststore_password=b3r3nYaHSxH_VPo >+ echo 'Creating the Hawkular Metrics keystore from the PEM file' >+ openssl pkcs12 -export -in /etc/deploy/_output/hawkular-metrics.pem -out /etc/deploy/_output/hawkular-metrics.pkcs12 -name hawkular-metrics -noiter -nomaciter -password pass:Di8ffWoQmyUP3o9 >Creating the Hawkular Metrics keystore from the PEM file >+ keytool -v -importkeystore -srckeystore /etc/deploy/_output/hawkular-metrics.pkcs12 -srcstoretype PKCS12 -destkeystore /etc/deploy/_output/hawkular-metrics.keystore -deststoretype JKS -deststorepass Di8ffWoQmyUP3o9 -srcstorepass Di8ffWoQmyUP3o9 >Entry for alias hawkular-metrics successfully imported. >Import command completed: 1 entries successfully imported, 0 entries failed or cancelled >[Storing /etc/deploy/_output/hawkular-metrics.keystore] >+ echo 'Creating the Hawkular Cassandra keystore from the PEM file' >+ openssl pkcs12 -export -in /etc/deploy/_output/hawkular-cassandra.pem -out /etc/deploy/_output/hawkular-cassandra.pkcs12 -name hawkular-cassandra -noiter -nomaciter -password pass:hInxtHjw3EKjkr- >Creating the Hawkular Cassandra keystore from the PEM file >+ keytool -v -importkeystore -srckeystore /etc/deploy/_output/hawkular-cassandra.pkcs12 -srcstoretype PKCS12 -destkeystore /etc/deploy/_output/hawkular-cassandra.keystore -deststoretype JKS -deststorepass hInxtHjw3EKjkr- -srcstorepass hInxtHjw3EKjkr- >Entry for alias hawkular-cassandra successfully imported. >Import command completed: 1 entries successfully imported, 0 entries failed or cancelled >[Storing /etc/deploy/_output/hawkular-cassandra.keystore] >+ echo 'Creating the Hawkular Metrics Certificate' >+ keytool -noprompt -export -alias hawkular-metrics -file /etc/deploy/_output/hawkular-metrics.cert -keystore /etc/deploy/_output/hawkular-metrics.keystore -storepass Di8ffWoQmyUP3o9 >Creating the Hawkular Metrics Certificate >Certificate stored in file </etc/deploy/_output/hawkular-metrics.cert> >+ echo 'Creating the Hawkular Cassandra Certificate' >+ keytool -noprompt -export -alias hawkular-cassandra -file /etc/deploy/_output/hawkular-cassandra.cert -keystore /etc/deploy/_output/hawkular-cassandra.keystore -storepass hInxtHjw3EKjkr- >Creating the Hawkular Cassandra Certificate >Certificate stored in file </etc/deploy/_output/hawkular-cassandra.cert> >+ echo 'Importing the Hawkular Metrics Certificate into the Cassandra Truststore' >+ keytool -noprompt -import -v -trustcacerts -alias hawkular-metrics -file /etc/deploy/_output/hawkular-metrics.cert -keystore /etc/deploy/_output/hawkular-cassandra.truststore -trustcacerts -storepass b3r3nYaHSxH_VPo >Importing the Hawkular Metrics Certificate into the Cassandra Truststore >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-cassandra.truststore] >+ echo 'Importing the Hawkular Cassandra Certificate into the Hawkular Metrics Truststore' >+ keytool -noprompt -import -v -trustcacerts -alias hawkular-cassandra -file /etc/deploy/_output/hawkular-cassandra.cert -keystore /etc/deploy/_output/hawkular-metrics.truststore -trustcacerts -storepass qc1cwWp2zcjiei9 >Importing the Hawkular Cassandra Certificate into the Hawkular Metrics Truststore >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-metrics.truststore] >+ echo 'Importing the Hawkular Cassandra Certificate into the Cassandra Truststore' >+ keytool -noprompt -import -v -trustcacerts -alias hawkular-cassandra -file /etc/deploy/_output/hawkular-cassandra.cert -keystore /etc/deploy/_output/hawkular-cassandra.truststore -trustcacerts -storepass b3r3nYaHSxH_VPo >Importing the Hawkular Cassandra Certificate into the Cassandra Truststore >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-cassandra.truststore] >+ echo 'Importing the CA Certificate into the Cassandra Truststore' >+ keytool -noprompt -import -v -trustcacerts -alias ca -file /etc/deploy/_output/ca.crt -keystore /etc/deploy/_output/hawkular-cassandra.truststore -trustcacerts -storepass b3r3nYaHSxH_VPo >Importing the CA Certificate into the Cassandra Truststore >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-cassandra.truststore] >+ keytool -noprompt -import -v -trustcacerts -alias metricca -file /etc/deploy/_output/hawkular-metrics-ca.cert -keystore /etc/deploy/_output/hawkular-cassandra.truststore -trustcacerts -storepass b3r3nYaHSxH_VPo >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-cassandra.truststore] >+ keytool -noprompt -import -v -trustcacerts -alias cassandraca -file /etc/deploy/_output/hawkular-cassandra-ca.cert -keystore /etc/deploy/_output/hawkular-cassandra.truststore -trustcacerts -storepass b3r3nYaHSxH_VPo >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-cassandra.truststore] >+ echo 'Importing the CA Certificate into the Hawkular Metrics Truststore' >+ keytool -noprompt -import -v -trustcacerts -alias ca -file /etc/deploy/_output/ca.crt -keystore /etc/deploy/_output/hawkular-metrics.truststore -trustcacerts -storepass qc1cwWp2zcjiei9 >Importing the CA Certificate into the Hawkular Metrics Truststore >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-metrics.truststore] >+ keytool -noprompt -import -v -trustcacerts -alias metricsca -file /etc/deploy/_output/hawkular-metrics-ca.cert -keystore /etc/deploy/_output/hawkular-metrics.truststore -trustcacerts -storepass qc1cwWp2zcjiei9 >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-metrics.truststore] >+ keytool -noprompt -import -v -trustcacerts -alias cassandraca -file /etc/deploy/_output/hawkular-cassandra-ca.cert -keystore /etc/deploy/_output/hawkular-metrics.truststore -trustcacerts -storepass qc1cwWp2zcjiei9 >Certificate was added to keystore >[Storing /etc/deploy/_output/hawkular-metrics.truststore] >++ cat /dev/urandom >++ tr -dc _A-Z-a-z-0-9 >++ head -c15 >+ hawkular_metrics_password=8ZXxDSjTkDZ4Abh >+ htpasswd -cb /etc/deploy/_output/hawkular-metrics.htpasswd hawkular 8ZXxDSjTkDZ4Abh > >Creating the Hawkular Metrics Secrets configuration json file >Adding password for user hawkular >+ echo >+ echo 'Creating the Hawkular Metrics Secrets configuration json file' >+ cat >++ base64 -w 0 /etc/deploy/_output/hawkular-metrics.keystore >++ base64 >+++ echo Di8ffWoQmyUP3o9 >++ base64 -w 0 /etc/deploy/_output/hawkular-metrics.truststore >++ base64 >+++ echo qc1cwWp2zcjiei9 >++ base64 >+++ echo hawkular-metrics >++ base64 -w 0 /etc/deploy/_output/hawkular-metrics.htpasswd >+ echo >+ echo 'Creating the Hawkular Metrics Certificate Secrets configuration json file' >+ cat > >Creating the Hawkular Metrics Certificate Secrets configuration json file >++ base64 -w 0 /etc/deploy/_output/hawkular-metrics.cert >++ base64 -w 0 /etc/deploy/_output/hawkular-metrics-ca.cert >+ echo >+ echo 'Creating the Hawkular Metrics User Account Secrets' >+ cat > >Creating the Hawkular Metrics User Account Secrets >++ base64 >+++ echo hawkular >++ base64 >+++ echo 8ZXxDSjTkDZ4Abh >+ echo >+ echo 'Creating the Cassandra Secrets configuration file' >+ cat > >Creating the Cassandra Secrets configuration file >++ base64 -w 0 /etc/deploy/_output/hawkular-cassandra.keystore >++ base64 >+++ echo hInxtHjw3EKjkr- >++ base64 >+++ echo hawkular-cassandra >++ base64 -w 0 /etc/deploy/_output/hawkular-cassandra.truststore >++ base64 >+++ echo b3r3nYaHSxH_VPo >++ base64 -w 0 /etc/deploy/_output/hawkular-cassandra.pem >+ echo >+ echo 'Creating the Cassandra Certificate Secrets configuration json file' >+ cat > >Creating the Cassandra Certificate Secrets configuration json file >++ base64 -w 0 /etc/deploy/_output/hawkular-cassandra.cert >++ base64 -w 0 /etc/deploy/_output/hawkular-cassandra-ca.cert >+ echo 'Creating Hawkular Metrics & Cassandra Secrets' >+ oc create -f /etc/deploy/_output/hawkular-metrics-secrets.json >Creating Hawkular Metrics & Cassandra Secrets >secret "hawkular-metrics-secrets" created >+ oc create -f /etc/deploy/_output/hawkular-metrics-certificate.json >secret "hawkular-metrics-certificate" created >+ oc create -f /etc/deploy/_output/hawkular-metrics-account.json >secret "hawkular-metrics-account" created >+ oc create -f /etc/deploy/_output/cassandra-secrets.json >secret "hawkular-cassandra-secrets" created >+ oc create -f /etc/deploy/_output/cassandra-certificate.json >secret "hawkular-cassandra-certificate" created >Creating Hawkular Metrics & Cassandra Templates >+ echo 'Creating Hawkular Metrics & Cassandra Templates' >+ oc create -f templates/hawkular-metrics.yaml >template "hawkular-metrics" created >+ oc create -f templates/hawkular-cassandra.yaml >template "hawkular-cassandra-services" created >+ oc create -f templates/hawkular-cassandra-node-pv.yaml >template "hawkular-cassandra-node-pv" created >+ oc create -f templates/hawkular-cassandra-node-dynamic-pv.yaml >template "hawkular-cassandra-node-dynamic-pv" created >+ oc create -f templates/hawkular-cassandra-node-emptydir.yaml >template "hawkular-cassandra-node-emptydir" created >+ oc create -f templates/support.yaml >template "hawkular-support" created >Deploying Hawkular Metrics & Cassandra Components >+ echo 'Deploying Hawkular Metrics & Cassandra Components' >+ oc process hawkular-metrics -v IMAGE_PREFIX=registry.ops.openshift.com/openshift3/,IMAGE_VERSION=3.3.0,METRIC_DURATION=7,MASTER_URL=https://104.155.174.187:8443,USER_WRITE_ACCESS=false >+ oc create -f - >service "hawkular-metrics" created >replicationcontroller "hawkular-metrics" created >+ oc process hawkular-cassandra-services >+ oc create -f - >service "hawkular-cassandra" created >service "hawkular-cassandra-nodes" created >+ oc process hawkular-support >+ oc create -f - >serviceaccount "hawkular" created >serviceaccount "cassandra" created >Creating the Hawkular Metrics Route >+ echo 'Creating the Hawkular Metrics Route' >+ route_params='--hostname=hawkular-metrics.0830-u3v.qe.rhcloud.com --service=hawkular-metrics --dest-ca-cert=/etc/deploy/_output/hawkular-metrics-ca.cert' >+ '[' -s /secret/hawkular-metrics.pem ']' >+ oc create route reencrypt hawkular-metrics --hostname=hawkular-metrics.0830-u3v.qe.rhcloud.com --service=hawkular-metrics --dest-ca-cert=/etc/deploy/_output/hawkular-metrics-ca.cert >route "hawkular-metrics" created >Setting up Cassandra with Dynamically Provisioned Storage >+ '[' deploy = refresh ']' >+ '[' true = true ']' >+ '[' true = true ']' >+ echo 'Setting up Cassandra with Dynamically Provisioned Storage' >+ oc create -f - >+ oc process hawkular-cassandra-node-dynamic-pv -v IMAGE_PREFIX=registry.ops.openshift.com/openshift3/,IMAGE_VERSION=3.3.0,NODE=1,PV_SIZE=10,MASTER=true >persistentvolumeclaim "metrics-cassandra-1" created >replicationcontroller "hawkular-cassandra-1" created >++ seq 2 1 >+ deploy_heapster >+ set -ex >+ '[' -n '' ']' >+ '[' -s /secret/heapster.cert ']' >+ openshift admin ca create-server-cert --key=/etc/deploy/_output/heapster.key --cert=/etc/deploy/_output/heapster.cert --hostnames=heapster --signer-cert=/etc/deploy/_output/ca.crt --signer-key=/etc/deploy/_output/ca.key --signer-serial=/etc/deploy/_output/ca.serial.txt >+ '[' -n '' ']' >+ '[' -s /secret/heapster-allowed-users ']' >+ echo system:master-proxy >+ '[' -n '' ']' >+ '[' -s /secret/heapster-client-ca.cert ']' >+ cp /var/run/secrets/kubernetes.io/serviceaccount/ca.crt /etc/deploy/_output/heapster_client_ca.cert > >Creating the Heapster Secrets configuration json file >+ echo >+ echo 'Creating the Heapster Secrets configuration json file' >+ cat >++ base64 -w 0 /etc/deploy/_output/heapster.cert >++ base64 -w 0 /etc/deploy/_output/heapster.key >++ base64 -w 0 /etc/deploy/_output/heapster_client_ca.cert >++ base64 -w 0 /etc/deploy/_output/heapster_allowed_users >+ echo 'Installing the Heapster Component.' >+ echo 'Creating the Heapster secret' >+ oc create -f /etc/deploy/_output/heapster-secrets.json >Installing the Heapster Component. >Creating the Heapster secret >secret "heapster-secrets" created >Creating the Heapster template >+ echo 'Creating the Heapster template' >+ '[' -n '' ']' >+ oc create -f templates/heapster.yaml >template "hawkular-heapster" created >Deploying the Heapster component >+ echo 'Deploying the Heapster component' >+ '[' -n '' ']' >+ oc process hawkular-heapster -v IMAGE_PREFIX=registry.ops.openshift.com/openshift3/,IMAGE_VERSION=3.3.0,MASTER_URL=https://104.155.174.187:8443,NODE_ID=nodename,METRIC_RESOLUTION=15s >+ oc create -f - >serviceaccount "heapster" created >service "heapster" created >replicationcontroller "heapster" created >========================= >VALIDATING THE DEPLOYMENT >--- validate_nodes_accessible --- >+ validate_deployment >+ set -e >+ set +x >--- validate_deployment_artifacts --- >======== ERROR ========= >validate_deployment_artifacts: >scripts/validate.sh: line 277: line[3]: unbound variable >======================== >--- validate_deployed_project --- > >VALIDATION FAILED > > >[penli@dhcp-137-185 33]$ oc get pv >NAME CAPACITY ACCESSMODES STATUS CLAIM REASON AGE >pvc-90b6675e-6e82-11e6-bca1-42010af00034 1Gi RWO Bound openshift-infra/metrics-cassandra-1 5m > >[penli@dhcp-137-185 33]$ oc get pvc >NAME STATUS VOLUME CAPACITY ACCESSMODES AGE >metrics-cassandra-1 Bound pvc-90b6675e-6e82-11e6-bca1-42010af00034 1Gi RWO 7m > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1371464
: 1195798