Skip to content

Instantly share code, notes, and snippets.

@anjannath
Created November 23, 2022 11:06
Show Gist options
  • Save anjannath/0d70658bd02cacdf66d90e090757240f to your computer and use it in GitHub Desktop.
Save anjannath/0d70658bd02cacdf66d90e090757240f to your computer and use it in GitHub Desktop.
INFO Kubelet client certificate has expired, renewing it... [will take up to 8 minutes]
DEBU retry loop: attempt 0
DEBU Waiting for availability of resource type 'csr'
DEBU retry loop: attempt 0
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: Process exited with status 1, output:
DEBU The connection to the server api.crc.testing:6443 was refused - did you specify the right host or port?
DEBU error: Temporary error: ssh command error:
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
err : Process exited with status 1
- sleeping 1s
DEBU retry loop: attempt 1
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: Process exited with status 1, output:
DEBU The connection to the server api.crc.testing:6443 was refused - did you specify the right host or port?
DEBU error: Temporary error: ssh command error:
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
err : Process exited with status 1
- sleeping 1s
DEBU retry loop: attempt 2
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: Process exited with status 1, output:
DEBU The connection to the server api.crc.testing:6443 was refused - did you specify the right host or port?
DEBU error: Temporary error: ssh command error:
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
err : Process exited with status 1
- sleeping 1s
DEBU retry loop: attempt 3
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: Process exited with status 124, output:
DEBU
DEBU error: Temporary error: ssh command error:
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
err : Process exited with status 124
- sleeping 1s
DEBU retry loop: attempt 4
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: Process exited with status 124, output:
DEBU
DEBU error: Temporary error: ssh command error:
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
err : Process exited with status 124
- sleeping 1s
DEBU retry loop: attempt 5
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: Process exited with status 1, output:
DEBU Unable to connect to the server: x509: certificate has expired or is not yet valid: current time 2024-11-23T10:00:35Z is after 2023-11-22T03:47:10Z
DEBU error: Temporary error: ssh command error:
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
err : Process exited with status 1
- sleeping 1s
DEBU retry loop: attempt 6
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: Process exited with status 1, output:
DEBU Unable to connect to the server: x509: certificate has expired or is not yet valid: current time 2024-11-23T10:00:36Z is after 2023-11-22T03:47:10Z
DEBU error: Temporary error: ssh command error:
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
err : Process exited with status 1
- sleeping 1s
DEBU retry loop: attempt 7
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
DEBU NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
DEBU Running SSH command: timeout 5s oc get csr -ojson --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: {
"apiVersion": "v1",
"items": [
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:46:05Z",
"generateName": "csr-",
"name": "csr-7hgz2",
"resourceVersion": "1636",
"uid": "d3e473f3-6495-4e18-ae5f-7297537a1835"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQk1qQ0IyQUlCQURCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SnpBbEJnTlZCQU1USG5ONQpjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5CkF3RUhBMElBQk80S3dSNEtLUDFzM0lpb3d0ZjQ1MWNQNHdqNTNpRVpaYjlwYUswNGZXbStuZFVGY3duYlN6eWsKM2U1eG82bDFGaUxtOGxoeTJHdnlPcElTSERmV3pjYWdOakEwQmdrcWhraUc5dzBCQ1E0eEp6QWxNQ01HQTFVZApFUVFjTUJxQ0VtTnlZeTFqYkhBMU5pMXRZWE4wWlhJdE1JY0V3S2grQ3pBS0JnZ3Foa2pPUFFRREFnTkpBREJHCkFpRUEyWVlGNnhBaUh6TTcybHk4S0QwVDBnSlNuTmR5MUFvMUpodDNQRWtOVHpRQ0lRQ01laGZaQ2lMc1pqNUMKYVFmUCtramNRZEU0Q1JVMHgyRU1MYUYrbVpYR0NnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUgUkVRVUVTVC0tLS0tCg==",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:46:12Z",
"lastUpdateTime": "2022-11-22T03:46:12Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:45:38Z",
"generateName": "csr-",
"name": "csr-bb8pq",
"resourceVersion": "1096",
"uid": "10c4f47a-011f-488c-bcb4-9b5589c4f056"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:45:52Z",
"lastUpdateTime": "2022-11-22T03:45:52Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:39:46Z",
"generateName": "csr-",
"name": "csr-hjzht",
"resourceVersion": "24455",
"uid": "ab37a5c0-7b5d-4096-b6fa-6469267c93e5"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:42:40Z",
"lastUpdateTime": "2022-11-23T04:42:40Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:10:23Z",
"generateName": "csr-",
"name": "csr-rm2xd",
"resourceVersion": "16354",
"uid": "dbe6163b-7322-46df-aa1c-a0492170d48e"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlIOE1JR2lBZ0VBTUVBeEZUQVRCZ05WQkFvVERITjVjM1JsYlRwdWIyUmxjekVuTUNVR0ExVUVBeE1lYzNsegpkR1Z0T201dlpHVTZZM0pqTFdOc2NEVTJMVzFoYzNSbGNpMHdNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBECkFRY0RRZ0FFMkRtZG8wSmFyT2owSGJvc3h3SGFqVVpqbzFaY2c3NVZoRUxUc01UaHZvZk9TVXZqWXYwU1NNWEEKNkIvOGx0RXFQcjBqbzZWTm5VZmhVWkVpVmZiWUdLQUFNQW9HQ0NxR1NNNDlCQU1DQTBrQU1FWUNJUURhRTRLMQowQndYUGxwN3FOOGJ3a1NUdXFmcXNGaWRyWDFVTFc5RTZFYVRPd0loQU85cWk2cmlKcldPdXMyV3NzcUw1QzgzCnd6T01DcFhuczJOdnNiaWJrSlFSCi0tLS0tRU5EIENFUlRJRklDQVRFIFJFUVVFU1QtLS0tLQo=",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:11:11Z",
"lastUpdateTime": "2022-11-23T04:11:11Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:24:44Z",
"generateName": "csr-",
"name": "csr-tdn28",
"resourceVersion": "24857",
"uid": "830874be-effb-4663-8c46-a5f56ca5ccfe"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:44:14Z",
"lastUpdateTime": "2022-11-23T04:44:14Z",
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)",
"reason": "NodeCSRApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:16:35Z",
"generateName": "csr-",
"name": "csr-xnt4q",
"resourceVersion": "24860",
"uid": "c4b03ba1-11ad-487d-b4cf-020800d9fc9c"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:44:14Z",
"lastUpdateTime": "2022-11-23T04:44:14Z",
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)",
"reason": "NodeCSRApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:47:01Z",
"generateName": "system:openshift:openshift-authenticator-",
"labels": {
"authentication.openshift.io/csr": "openshift-authenticator"
},
"name": "system:openshift:openshift-authenticator-6b999",
"resourceVersion": "3438",
"uid": "35454b81-aee4-4983-98d6-0750840e3a18"
},
"spec": {
"extra": {
"authentication.kubernetes.io/pod-name": [
"authentication-operator-864b67f576-fb6pc"
],
"authentication.kubernetes.io/pod-uid": [
"7f7a8011-bd7d-477c-bff7-a770c799bd4f"
]
},
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:openshift-authentication-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client",
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:47:01Z",
"lastUpdateTime": "2022-11-22T03:47:01Z",
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-6b999\"",
"reason": "AutoApproved",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:22:55Z",
"generateName": "system:openshift:openshift-authenticator-",
"labels": {
"authentication.openshift.io/csr": "openshift-authenticator"
},
"name": "system:openshift:openshift-authenticator-hqstr",
"resourceVersion": "19098",
"uid": "fd22e0fb-7ce4-4f22-8310-d4c306b8c969"
},
"spec": {
"extra": {
"authentication.kubernetes.io/pod-name": [
"authentication-operator-864b67f576-fb6pc"
],
"authentication.kubernetes.io/pod-uid": [
"7f7a8011-bd7d-477c-bff7-a770c799bd4f"
]
},
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:openshift-authentication-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client",
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:22:55Z",
"lastUpdateTime": "2022-11-23T04:22:55Z",
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-hqstr\"",
"reason": "AutoApproved",
"status": "True",
"type": "Approved"
}
]
}
}
],
"kind": "List",
"metadata": {
"resourceVersion": ""
}
}
DEBU error: Temporary error: No Pending CSR with signerName kubernetes.io/kube-apiserver-client-kubelet - sleeping 5s
DEBU retry loop: attempt 1
DEBU Waiting for availability of resource type 'csr'
DEBU retry loop: attempt 0
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-qchpg 3s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Pending
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
DEBU NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-qchpg 3s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Pending
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
DEBU Running SSH command: timeout 5s oc get csr -ojson --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: {
"apiVersion": "v1",
"items": [
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:46:05Z",
"generateName": "csr-",
"name": "csr-7hgz2",
"resourceVersion": "1636",
"uid": "d3e473f3-6495-4e18-ae5f-7297537a1835"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQk1qQ0IyQUlCQURCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SnpBbEJnTlZCQU1USG5ONQpjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5CkF3RUhBMElBQk80S3dSNEtLUDFzM0lpb3d0ZjQ1MWNQNHdqNTNpRVpaYjlwYUswNGZXbStuZFVGY3duYlN6eWsKM2U1eG82bDFGaUxtOGxoeTJHdnlPcElTSERmV3pjYWdOakEwQmdrcWhraUc5dzBCQ1E0eEp6QWxNQ01HQTFVZApFUVFjTUJxQ0VtTnlZeTFqYkhBMU5pMXRZWE4wWlhJdE1JY0V3S2grQ3pBS0JnZ3Foa2pPUFFRREFnTkpBREJHCkFpRUEyWVlGNnhBaUh6TTcybHk4S0QwVDBnSlNuTmR5MUFvMUpodDNQRWtOVHpRQ0lRQ01laGZaQ2lMc1pqNUMKYVFmUCtramNRZEU0Q1JVMHgyRU1MYUYrbVpYR0NnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUgUkVRVUVTVC0tLS0tCg==",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:46:12Z",
"lastUpdateTime": "2022-11-22T03:46:12Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:45:38Z",
"generateName": "csr-",
"name": "csr-bb8pq",
"resourceVersion": "1096",
"uid": "10c4f47a-011f-488c-bcb4-9b5589c4f056"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlIOE1JR2lBZ0VBTUVBeEZUQVRCZ05WQkFvVERITjVjM1JsYlRwdWIyUmxjekVuTUNVR0ExVUVBeE1lYzNsegpkR1Z0T201dlpHVTZZM0pqTFdOc2NEVTJMVzFoYzNSbGNpMHdNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBECkFRY0RRZ0FFQXV6c2hOTWRyY0l1Rk5zVzhObXBDLzBCdTd0d2tVRmlrQWw1QjFMZmF6ZWkzb2VWUFFNY1BrMlQKVGN6MXQ3cG5uZEMxU1hTWXJSUS9uR2FrU3I5RGg2QUFNQW9HQ0NxR1NNNDlCQU1DQTBrQU1FWUNJUUNENFZKbgpPUG9jZHVzeEdSY2YzQjI0czVQRHJpNVR4SC9YNjdDMi84dmdtZ0loQU15RzQ0LzJaN2ZCSXNhTDBraytmK3ZWCkl4dXJOak5aRHNRY1hYVmtTN0FHCi0tLS0tRU5EIENFUlRJRklDQVRFIFJFUVVFU1QtLS0tLQo=",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:45:52Z",
"lastUpdateTime": "2022-11-22T03:45:52Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:39:46Z",
"generateName": "csr-",
"name": "csr-hjzht",
"resourceVersion": "24455",
"uid": "ab37a5c0-7b5d-4096-b6fa-6469267c93e5"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:42:40Z",
"lastUpdateTime": "2022-11-23T04:42:40Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T10:00:49Z",
"generateName": "csr-",
"name": "csr-qchpg",
"resourceVersion": "26052",
"uid": "4e18664a-73bc-4c43-a0d7-3057f2758f03"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:10:23Z",
"generateName": "csr-",
"name": "csr-rm2xd",
"resourceVersion": "16354",
"uid": "dbe6163b-7322-46df-aa1c-a0492170d48e"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlIOE1JR2lBZ0VBTUVBeEZUQVRCZ05WQkFvVERITjVjM1JsYlRwdWIyUmxjekVuTUNVR0ExVUVBeE1lYzNsegpkR1Z0T201dlpHVTZZM0pqTFdOc2NEVTJMVzFoYzNSbGNpMHdNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBECkFRY0RRZ0FFMkRtZG8wSmFyT2owSGJvc3h3SGFqVVpqbzFaY2c3NVZoRUxUc01UaHZvZk9TVXZqWXYwU1NNWEEKNkIvOGx0RXFQcjBqbzZWTm5VZmhVWkVpVmZiWUdLQUFNQW9HQ0NxR1NNNDlCQU1DQTBrQU1FWUNJUURhRTRLMQowQndYUGxwN3FOOGJ3a1NUdXFmcXNGaWRyWDFVTFc5RTZFYVRPd0loQU85cWk2cmlKcldPdXMyV3NzcUw1QzgzCnd6T01DcFhuczJOdnNiaWJrSlFSCi0tLS0tRU5EIENFUlRJRklDQVRFIFJFUVVFU1QtLS0tLQo=",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:11:11Z",
"lastUpdateTime": "2022-11-23T04:11:11Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:24:44Z",
"generateName": "csr-",
"name": "csr-tdn28",
"resourceVersion": "24857",
"uid": "830874be-effb-4663-8c46-a5f56ca5ccfe"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:44:14Z",
"lastUpdateTime": "2022-11-23T04:44:14Z",
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)",
"reason": "NodeCSRApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:16:35Z",
"generateName": "csr-",
"name": "csr-xnt4q",
"resourceVersion": "24860",
"uid": "c4b03ba1-11ad-487d-b4cf-020800d9fc9c"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQk1UQ0IyQUlCQURCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SnpBbEJnTlZCQU1USG5ONQpjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5CkF3RUhBMElBQk81ZmpJTnkxSFNVdUZ3eFhaWWxEWXVVSHcwUmxtbkR6Q3hGdGRRT2VMd2Y0bVNuUm5IeFhZRG0KVjZMRnVuM1cwWUZkWjUwK0ZOY2V2cnUwZStReGw1ZWdOakEwQmdrcWhraUc5dzBCQ1E0eEp6QWxNQ01HQTFVZApFUVFjTUJxQ0VtTnlZeTFqYkhBMU5pMXRZWE4wWlhJdE1JY0V3S2grQ3pBS0JnZ3Foa2pPUFFRREFnTklBREJGCkFpRUExVjlFek9uREFxakhRRnNHd3lSelFiRmR2OG8wSWVJTlB4RHNCRGpvUDgwQ0lGT2dLb3VQNHRrajBpZFYKdjNmSXpkcFh1VytpSnB1VTIwZlNtR1NoT0preQotLS0tLUVORCBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0K",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:44:14Z",
"lastUpdateTime": "2022-11-23T04:44:14Z",
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)",
"reason": "NodeCSRApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:47:01Z",
"generateName": "system:openshift:openshift-authenticator-",
"labels": {
"authentication.openshift.io/csr": "openshift-authenticator"
},
"name": "system:openshift:openshift-authenticator-6b999",
"resourceVersion": "3438",
"uid": "35454b81-aee4-4983-98d6-0750840e3a18"
},
"spec": {
"extra": {
"authentication.kubernetes.io/pod-name": [
"authentication-operator-864b67f576-fb6pc"
],
"authentication.kubernetes.io/pod-uid": [
"7f7a8011-bd7d-477c-bff7-a770c799bd4f"
]
},
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:openshift-authentication-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client",
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:47:01Z",
"lastUpdateTime": "2022-11-22T03:47:01Z",
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-6b999\"",
"reason": "AutoApproved",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:22:55Z",
"generateName": "system:openshift:openshift-authenticator-",
"labels": {
"authentication.openshift.io/csr": "openshift-authenticator"
},
"name": "system:openshift:openshift-authenticator-hqstr",
"resourceVersion": "19098",
"uid": "fd22e0fb-7ce4-4f22-8310-d4c306b8c969"
},
"spec": {
"extra": {
"authentication.kubernetes.io/pod-name": [
"authentication-operator-864b67f576-fb6pc"
],
"authentication.kubernetes.io/pod-uid": [
"7f7a8011-bd7d-477c-bff7-a770c799bd4f"
]
},
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:openshift-authentication-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client",
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator"
},
"status": {
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNqakNDQVhhZ0F3SUJBZ0lSQUpxRWNQdkk3RnpHanl3TEVRK0JsUjR3RFFZSktvWklodmNOQVFFTEJRQXcKSmpFa01DSUdBMVVFQXd3YmEzVmlaUzFqYzNJdGMybG5ibVZ5WDBBeE5qWTVNVGMyT0RFNU1CNFhEVEl5TVRFeQpNekEwTVRjMU5Wb1hEVEl6TVRFeU16QTBNVGMxTlZvd1VqRlFNRTRHQTFVRUF4TkhjM2x6ZEdWdE9uTmxjblpwClkyVmhZMk52ZFc1ME9tOXdaVzV6YUdsbWRDMXZZWFYwYUMxaGNHbHpaWEoyWlhJNmIzQmxibk5vYVdaMExXRjEKZEdobGJuUnBZMkYwYjNJd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQ1JUd2hhYlp6WmJiYgo0RjBLS3JPenJKQ2JRV0xyTlpHREFzZDhZVzk4WnVvNDdsZ1dJaStWNVFIcSsxdGxxaWNkblJCTUxOOTRvMUUyCmJIcjlWZkVubzFZd1ZEQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3SXcKREFZRFZSMFRBUUgvQkFJd0FEQWZCZ05WSFNNRUdEQVdnQlJYQWhQNGNFT2xXUS9ocmU4cHEzRUNiOEhlbWpBTgpCZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFGU2tHdFZDQWo0MkJzR3VQOVlKWEVqR3FsbWFkL0FnblQrR0tZM0ZWCmtlSXpXOUo2Zm5Cd2EwQTRuUjZXbmNQMDc1dVVSbmpFSmpCNzNKU0lxWmZxWGtXZTFya1lZR3VTZWxUdUVSeVYKTWdMMVltb2R6cTd0bDNtMUduMW5nSUN4aUhiWHVTUUdhaWNlSExhTndlaUIzdTFSZVI2SzY2ZUNqbmhnSHFNVQphWllHSGlsYm4rZ0loQk1TWFJGdUxDTnJtMUx3REhGcE45ak1XaVhBUjZoaHhLaXBUWGlzbklEbmttaWdtZzhrCkhUMVlCYjBxYTJqa3NwbTk4OENGclVxR0pXS3EvdjluUzQ2ZVZPQVBraU80MEhCbzFOeHFJeWdTekRUQ1NmdGEKUlBBakcyMDA0N0UxTS8wWkwyckU3M0s0Vm5nZFJURkh4alVUelpLWDNzMTNwUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:22:55Z",
"lastUpdateTime": "2022-11-23T04:22:55Z",
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-hqstr\"",
"reason": "AutoApproved",
"status": "True",
"type": "Approved"
}
]
}
}
],
"kind": "List",
"metadata": {
"resourceVersion": ""
}
}
DEBU Approving csr csr-qchpg (signerName: kubernetes.io/kube-apiserver-client-kubelet)
DEBU Running SSH command: timeout 30s oc adm certificate approve csr-qchpg --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: certificatesigningrequest.certificates.k8s.io/csr-qchpg approved
DEBU Waiting for availability of resource type 'csr'
DEBU retry loop: attempt 0
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-qchpg 5s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
DEBU NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-qchpg 5s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued
DEBU Running SSH command: timeout 5s oc get csr -ojson --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: {
"apiVersion": "v1",
"items": [
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:46:05Z",
"generateName": "csr-",
"name": "csr-7hgz2",
"resourceVersion": "1636",
"uid": "d3e473f3-6495-4e18-ae5f-7297537a1835"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQk1qQ0IyQUlCQURCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SnpBbEJnTlZCQU1USG5ONQpjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5CkF3RUhBMElBQk80S3dSNEtLUDFzM0lpb3d0ZjQ1MWNQNHdqNTNpRVpaYjlwYUswNGZXbStuZFVGY3duYlN6eWsKM2U1eG82bDFGaUxtOGxoeTJHdnlPcElTSERmV3pjYWdOakEwQmdrcWhraUc5dzBCQ1E0eEp6QWxNQ01HQTFVZApFUVFjTUJxQ0VtTnlZeTFqYkhBMU5pMXRZWE4wWlhJdE1JY0V3S2grQ3pBS0JnZ3Foa2pPUFFRREFnTkpBREJHCkFpRUEyWVlGNnhBaUh6TTcybHk4S0QwVDBnSlNuTmR5MUFvMUpodDNQRWtOVHpRQ0lRQ01laGZaQ2lMc1pqNUMKYVFmUCtramNRZEU0Q1JVMHgyRU1MYUYrbVpYR0NnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUgUkVRVUVTVC0tLS0tCg==",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:46:12Z",
"lastUpdateTime": "2022-11-22T03:46:12Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:45:38Z",
"generateName": "csr-",
"name": "csr-bb8pq",
"resourceVersion": "1096",
"uid": "10c4f47a-011f-488c-bcb4-9b5589c4f056"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:45:52Z",
"lastUpdateTime": "2022-11-22T03:45:52Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:39:46Z",
"generateName": "csr-",
"name": "csr-hjzht",
"resourceVersion": "24455",
"uid": "ab37a5c0-7b5d-4096-b6fa-6469267c93e5"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:42:40Z",
"lastUpdateTime": "2022-11-23T04:42:40Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T10:00:49Z",
"generateName": "csr-",
"name": "csr-qchpg",
"resourceVersion": "26056",
"uid": "4e18664a-73bc-4c43-a0d7-3057f2758f03"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {
"conditions": [
{
"lastTransitionTime": "2022-11-23T10:00:54Z",
"lastUpdateTime": "2022-11-23T10:00:54Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:10:23Z",
"generateName": "csr-",
"name": "csr-rm2xd",
"resourceVersion": "16354",
"uid": "dbe6163b-7322-46df-aa1c-a0492170d48e"
},
"spec": {
"groups": [
"system:serviceaccounts:openshift-machine-config-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client-kubelet",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:11:11Z",
"lastUpdateTime": "2022-11-23T04:11:11Z",
"message": "This CSR was approved by kubectl certificate approve.",
"reason": "KubectlApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:24:44Z",
"generateName": "csr-",
"name": "csr-tdn28",
"resourceVersion": "24857",
"uid": "830874be-effb-4663-8c46-a5f56ca5ccfe"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQk1EQ0IyQUlCQURCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SnpBbEJnTlZCQU1USG5ONQpjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5CkF3RUhBMElBQksvRWtVMjA0VVZFZ0dhVzZQcVErZ24xSEE2K2w2eVlyQmFjSVhVaDRSRjM2SW1HL0ZxQ2xOZlgKWFBqZG85Y2pIWmNmcU9SNitXNUloaFdhOWdSRXFxS2dOakEwQmdrcWhraUc5dzBCQ1E0eEp6QWxNQ01HQTFVZApFUVFjTUJxQ0VtTnlZeTFqYkhBMU5pMXRZWE4wWlhJdE1JY0V3S2grQ3pBS0JnZ3Foa2pPUFFRREFnTkhBREJFCkFpQU1jNlV1Wk1vaVNlZXgwMWxudjZRU3orRWpkWm9JT1hmVmp0TWVrQy83alFJZ2QzTlB2VHZxSDJFQW15QUQKQjlUdEk4SFVaL2lSdnZCR1JpajExZU1XS3MwPQotLS0tLUVORCBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0K",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNvRENDQVlpZ0F3SUJBZ0lRTkdvdXJZZ1Z0ZnZEN3hkYUt3RDR6REFOQmdrcWhraUc5dzBCQVFzRkFEQW0KTVNRd0lnWURWUVFEREJ0cmRXSmxMV056Y2kxemFXZHVaWEpmUURFMk5qa3hOelk0TVRrd0hoY05Nakl4TVRJegpNRFF6T1RFMFdoY05Nak14TVRJek1EUXpPVEUwV2pCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14Ckp6QWxCZ05WQkFNVEhuTjVjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUcKU000OUFnRUdDQ3FHU000OUF3RUhBMElBQksvRWtVMjA0VVZFZ0dhVzZQcVErZ24xSEE2K2w2eVlyQmFjSVhVaAo0UkYzNkltRy9GcUNsTmZYWFBqZG85Y2pIWmNmcU9SNitXNUloaFdhOWdSRXFxS2plekI1TUE0R0ExVWREd0VCCi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUI4R0ExVWQKSXdRWU1CYUFGRmNDRS9od1E2VlpEK0d0N3ltcmNRSnZ3ZDZhTUNNR0ExVWRFUVFjTUJxQ0VtTnlZeTFqYkhBMQpOaTF0WVhOMFpYSXRNSWNFd0toK0N6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFKMisxUmFITmFybCs4UHAxCkxqMmNjQnhxUUhtZnJhUmRBOTNOZ1liVktEQk5wSFhzcGo2TFBNeVVCK3BzZVk1R2FqcEFiMk8zT1dUT3QxUloKOFpUTjFMYzVIQzZZakxIOFFnRGJHUVM4WTRJRVE0UWkwN3hXQ0hUSzlSTTdsVGM3QkNpaHpqYXVCYllDSkVLUwpVcGptY1RoaVVNQ0ZCSUJrMHB4dVJOZnEyK1RRM05pT1ZIWFpJeTVhUmZsM0RaaE9JMGIzckx4T0t3d0w0T2Q5ClBvaUNuUzdRSzIrcm4zM0R1VGdUKzZITWt1Vlhpb3JqNXdDSStGVkhEWHJESWp0bWNRdzBzZ0xSejcreXJNV0gKb1RyeXhuQ0FyQTl2VVl1MGNsM1d0YTUyMWpUaXJ4dkR1M21hSDI5VTlzeTJRVDVwOFVEUGd1TjN3THJRUS82egpBejZEbEE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:44:14Z",
"lastUpdateTime": "2022-11-23T04:44:14Z",
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)",
"reason": "NodeCSRApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:16:35Z",
"generateName": "csr-",
"name": "csr-xnt4q",
"resourceVersion": "24860",
"uid": "c4b03ba1-11ad-487d-b4cf-020800d9fc9c"
},
"spec": {
"groups": [
"system:nodes",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kubelet-serving",
"usages": [
"digital signature",
"key encipherment",
"server auth"
],
"username": "system:node:crc-clp56-master-0"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:44:14Z",
"lastUpdateTime": "2022-11-23T04:44:14Z",
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)",
"reason": "NodeCSRApprove",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-22T03:47:01Z",
"generateName": "system:openshift:openshift-authenticator-",
"labels": {
"authentication.openshift.io/csr": "openshift-authenticator"
},
"name": "system:openshift:openshift-authenticator-6b999",
"resourceVersion": "3438",
"uid": "35454b81-aee4-4983-98d6-0750840e3a18"
},
"spec": {
"extra": {
"authentication.kubernetes.io/pod-name": [
"authentication-operator-864b67f576-fb6pc"
],
"authentication.kubernetes.io/pod-uid": [
"7f7a8011-bd7d-477c-bff7-a770c799bd4f"
]
},
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:openshift-authentication-operator",
"system:authenticated"
],
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQkRqQ0J0QUlCQURCU01WQXdUZ1lEVlFRREUwZHplWE4wWlcwNmMyVnlkbWxqWldGalkyOTFiblE2YjNCbApibk5vYVdaMExXOWhkWFJvTFdGd2FYTmxjblpsY2pwdmNHVnVjMmhwWm5RdFlYVjBhR1Z1ZEdsallYUnZjakJaCk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkx3Vkh4Umd1SzZQOHUzRVlob3VyM2VkOSsrQ1Z5dHQKc1lOd2U4bTRDWTdNc3BJckw3bFM2YzY3WElDazRvNHJpMWpsb0hNazNtVGxpb0hjSDkrVSsxZWdBREFLQmdncQpoa2pPUFFRREFnTkpBREJHQWlFQTVjNktrcmV1SjkzTFphRDV3b2s3dnRGUnF0R1F1UHlseGhSdHdXcmwzbndDCklRQ1BlajdzR2ZFcnJyV2RRZDh5eXZCSzZqUWI5a2ZSejlJQUc4YkNEb1JraFE9PQotLS0tLUVORCBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0K",
"signerName": "kubernetes.io/kube-apiserver-client",
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator"
},
"status": {
"certificate": "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",
"conditions": [
{
"lastTransitionTime": "2022-11-22T03:47:01Z",
"lastUpdateTime": "2022-11-22T03:47:01Z",
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-6b999\"",
"reason": "AutoApproved",
"status": "True",
"type": "Approved"
}
]
}
},
{
"apiVersion": "certificates.k8s.io/v1",
"kind": "CertificateSigningRequest",
"metadata": {
"creationTimestamp": "2022-11-23T04:22:55Z",
"generateName": "system:openshift:openshift-authenticator-",
"labels": {
"authentication.openshift.io/csr": "openshift-authenticator"
},
"name": "system:openshift:openshift-authenticator-hqstr",
"resourceVersion": "19098",
"uid": "fd22e0fb-7ce4-4f22-8310-d4c306b8c969"
},
"spec": {
"extra": {
"authentication.kubernetes.io/pod-name": [
"authentication-operator-864b67f576-fb6pc"
],
"authentication.kubernetes.io/pod-uid": [
"7f7a8011-bd7d-477c-bff7-a770c799bd4f"
]
},
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:openshift-authentication-operator",
"system:authenticated"
],
"request": "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",
"signerName": "kubernetes.io/kube-apiserver-client",
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5",
"usages": [
"digital signature",
"key encipherment",
"client auth"
],
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator"
},
"status": {
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNqakNDQVhhZ0F3SUJBZ0lSQUpxRWNQdkk3RnpHanl3TEVRK0JsUjR3RFFZSktvWklodmNOQVFFTEJRQXcKSmpFa01DSUdBMVVFQXd3YmEzVmlaUzFqYzNJdGMybG5ibVZ5WDBBeE5qWTVNVGMyT0RFNU1CNFhEVEl5TVRFeQpNekEwTVRjMU5Wb1hEVEl6TVRFeU16QTBNVGMxTlZvd1VqRlFNRTRHQTFVRUF4TkhjM2x6ZEdWdE9uTmxjblpwClkyVmhZMk52ZFc1ME9tOXdaVzV6YUdsbWRDMXZZWFYwYUMxaGNHbHpaWEoyWlhJNmIzQmxibk5vYVdaMExXRjEKZEdobGJuUnBZMkYwYjNJd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQ1JUd2hhYlp6WmJiYgo0RjBLS3JPenJKQ2JRV0xyTlpHREFzZDhZVzk4WnVvNDdsZ1dJaStWNVFIcSsxdGxxaWNkblJCTUxOOTRvMUUyCmJIcjlWZkVubzFZd1ZEQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3SXcKREFZRFZSMFRBUUgvQkFJd0FEQWZCZ05WSFNNRUdEQVdnQlJYQWhQNGNFT2xXUS9ocmU4cHEzRUNiOEhlbWpBTgpCZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFGU2tHdFZDQWo0MkJzR3VQOVlKWEVqR3FsbWFkL0FnblQrR0tZM0ZWCmtlSXpXOUo2Zm5Cd2EwQTRuUjZXbmNQMDc1dVVSbmpFSmpCNzNKU0lxWmZxWGtXZTFya1lZR3VTZWxUdUVSeVYKTWdMMVltb2R6cTd0bDNtMUduMW5nSUN4aUhiWHVTUUdhaWNlSExhTndlaUIzdTFSZVI2SzY2ZUNqbmhnSHFNVQphWllHSGlsYm4rZ0loQk1TWFJGdUxDTnJtMUx3REhGcE45ak1XaVhBUjZoaHhLaXBUWGlzbklEbmttaWdtZzhrCkhUMVlCYjBxYTJqa3NwbTk4OENGclVxR0pXS3EvdjluUzQ2ZVZPQVBraU80MEhCbzFOeHFJeWdTekRUQ1NmdGEKUlBBakcyMDA0N0UxTS8wWkwyckU3M0s0Vm5nZFJURkh4alVUelpLWDNzMTNwUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K",
"conditions": [
{
"lastTransitionTime": "2022-11-23T04:22:55Z",
"lastUpdateTime": "2022-11-23T04:22:55Z",
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-hqstr\"",
"reason": "AutoApproved",
"status": "True",
"type": "Approved"
}
]
}
}
],
"kind": "List",
"metadata": {
"resourceVersion": ""
}
}
DEBU Deleting csr system:openshift:openshift-authenticator-6b999 (signerName: kubernetes.io/kube-apiserver-client)
DEBU Running SSH command: timeout 30s oc delete csr system:openshift:openshift-authenticator-6b999 --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: certificatesigningrequest.certificates.k8s.io "system:openshift:openshift-authenticator-6b999" deleted
DEBU Deleting csr system:openshift:openshift-authenticator-hqstr (signerName: kubernetes.io/kube-apiserver-client)
DEBU Running SSH command: timeout 30s oc delete csr system:openshift:openshift-authenticator-hqstr --context admin --cluster crc --kubeconfig /opt/kubeconfig
DEBU SSH command results: err: <nil>, output: certificatesigningrequest.certificates.k8s.io "system:openshift:openshift-authenticator-hqstr" deleted
DEBU retry loop: attempt 0
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 1
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 2
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 3
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 4
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 5
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 6
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 7
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 8
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 9
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 10
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 11
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 12
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 13
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 14
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 15
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 16
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 17
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 18
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 19
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 20
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 21
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 22
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 23
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 24
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 25
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 26
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 27
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 28
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 29
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 30
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 31
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 32
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 33
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 34
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 35
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 36
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 37
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 38
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 39
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 40
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 41
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 42
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 43
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 44
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 45
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 46
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 47
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 48
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 49
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 50
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 51
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 52
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 53
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 54
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 55
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 56
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 57
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 58
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU retry loop: attempt 59
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s
DEBU RetryAfter timeout after 60 tries
DEBU Error approving pending kube-apiserver-client-kubelet CSR: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired (x60)
DEBU Bundle has been generated 731 days ago
Failed to renew TLS certificates: please check if a newer CRC release is available: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired (x60)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment