From 6f09db51053e8d6ef8300834089afb0e654809bf Mon Sep 17 00:00:00 2001 From: Kathryn Alexander Date: Fri, 17 May 2019 09:59:07 -0400 Subject: [PATCH] updating kube version --- modules/nodes-nodes-audit-log-basic-viewing.adoc | 2 +- modules/nodes-nodes-audit-log-basic.adoc | 4 ++-- modules/nodes-nodes-viewing-listing.adoc | 10 +++++----- modules/nodes-nodes-working-evacuating.adoc | 2 +- 4 files changed, 9 insertions(+), 9 deletions(-) diff --git a/modules/nodes-nodes-audit-log-basic-viewing.adoc b/modules/nodes-nodes-audit-log-basic-viewing.adoc index 970daaafdd..bf7c6f5231 100644 --- a/modules/nodes-nodes-audit-log-basic-viewing.adoc +++ b/modules/nodes-nodes-audit-log-basic-viewing.adoc @@ -82,7 +82,7 @@ $ oc adm node-logs ip-10-0-170-165.ec2.internal audit.log --path=kube-apiserver/ The output appears similar to the following: + ---- -ip-10-0-140-97.ec2.internal {"kind":"Event","apiVersion":"audit.k8s.io/v1beta1","metadata":{"creationTimestamp":"2019-04-09T19:56:58Z"},"level":"Metadata","timestamp":"2019-04-09T19:56:58Z","auditID":"6e96c88b-ab6f-44d2-b62e-d1413efd676b","stage":"ResponseComplete","requestURI":"/api/v1/nodes/audit-2019-04-09T14-07-27.129.log","verb":"get","user":{"username":"kube:admin","groups":["system:cluster-admins","system:authenticated"],"extra":{"scopes.authorization.openshift.io":["user:full"]}},"sourceIPs":["10.0.57.93"],"userAgent":"oc/v1.12.4+ba88cb26ba (linux/amd64) kubernetes/ba88cb2","objectRef":{"resource":"nodes","name":"audit-2019-04-09T14-07-27.129.log","apiVersion":"v1"},"responseStatus":{"metadata":{},"status":"Failure","reason":"NotFound","code":404},"requestReceivedTimestamp":"2019-04-09T19:56:58.982157Z","stageTimestamp":"2019-04-09T19:56:58.985300Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"cluster-admins\" of ClusterRole \"cluster-admin\" to Group \"system:cluster-admins\""}} +ip-10-0-140-97.ec2.internal {"kind":"Event","apiVersion":"audit.k8s.io/v1beta1","metadata":{"creationTimestamp":"2019-04-09T19:56:58Z"},"level":"Metadata","timestamp":"2019-04-09T19:56:58Z","auditID":"6e96c88b-ab6f-44d2-b62e-d1413efd676b","stage":"ResponseComplete","requestURI":"/api/v1/nodes/audit-2019-04-09T14-07-27.129.log","verb":"get","user":{"username":"kube:admin","groups":["system:cluster-admins","system:authenticated"],"extra":{"scopes.authorization.openshift.io":["user:full"]}},"sourceIPs":["10.0.57.93"],"userAgent":"oc/v1.13.4+b626c2fe1 (linux/amd64) kubernetes/ba88cb2","objectRef":{"resource":"nodes","name":"audit-2019-04-09T14-07-27.129.log","apiVersion":"v1"},"responseStatus":{"metadata":{},"status":"Failure","reason":"NotFound","code":404},"requestReceivedTimestamp":"2019-04-09T19:56:58.982157Z","stageTimestamp":"2019-04-09T19:56:58.985300Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"cluster-admins\" of ClusterRole \"cluster-admin\" to Group \"system:cluster-admins\""}} ---- diff --git a/modules/nodes-nodes-audit-log-basic.adoc b/modules/nodes-nodes-audit-log-basic.adoc index 47a24f1829..d5df3cb97e 100644 --- a/modules/nodes-nodes-audit-log-basic.adoc +++ b/modules/nodes-nodes-audit-log-basic.adoc @@ -22,12 +22,12 @@ Each audit log contains two entries: .. The unique ID from #1 .. The response code -You can view logs for the master nodes for the {product-title} API server or the Kubernetes API server. +You can view logs for the master nodes for the {product-title} API server or the Kubernetes API server. Example output for the Kubelet API server: ---- -ip-10-0-140-97.ec2.internal {"kind":"Event","apiVersion":"audit.k8s.io/v1beta1","metadata":{"creationTimestamp":"2019-04-09T19:56:58Z"},"level":"Metadata","timestamp":"2019-04-09T19:56:58Z","auditID":"6e96c88b-ab6f-44d2-b62e-d1413efd676b","stage":"ResponseComplete","requestURI":"/api/v1/nodes/audit-2019-04-09T14-07-27.129.log","verb":"get","user":{"username":"kube:admin","groups":["system:cluster-admins","system:authenticated"],"extra":{"scopes.authorization.openshift.io":["user:full"]}},"sourceIPs":["10.0.57.93"],"userAgent":"oc/v1.12.4+ba88cb26ba (linux/amd64) kubernetes/ba88cb2","objectRef":{"resource":"nodes","name":"audit-2019-04-09T14-07-27.129.log","apiVersion":"v1"},"responseStatus":{"metadata":{},"status":"Failure","reason":"NotFound","code":404},"requestReceivedTimestamp":"2019-04-09T19:56:58.982157Z","stageTimestamp":"2019-04-09T19:56:58.985300Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"cluster-admins\" of ClusterRole \"cluster-admin\" to Group \"system:cluster-admins\""}} +ip-10-0-140-97.ec2.internal {"kind":"Event","apiVersion":"audit.k8s.io/v1beta1","metadata":{"creationTimestamp":"2019-04-09T19:56:58Z"},"level":"Metadata","timestamp":"2019-04-09T19:56:58Z","auditID":"6e96c88b-ab6f-44d2-b62e-d1413efd676b","stage":"ResponseComplete","requestURI":"/api/v1/nodes/audit-2019-04-09T14-07-27.129.log","verb":"get","user":{"username":"kube:admin","groups":["system:cluster-admins","system:authenticated"],"extra":{"scopes.authorization.openshift.io":["user:full"]}},"sourceIPs":["10.0.57.93"],"userAgent":"oc/v1.13.4+b626c2fe1 (linux/amd64) kubernetes/ba88cb2","objectRef":{"resource":"nodes","name":"audit-2019-04-09T14-07-27.129.log","apiVersion":"v1"},"responseStatus":{"metadata":{},"status":"Failure","reason":"NotFound","code":404},"requestReceivedTimestamp":"2019-04-09T19:56:58.982157Z","stageTimestamp":"2019-04-09T19:56:58.985300Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"cluster-admins\" of ClusterRole \"cluster-admin\" to Group \"system:cluster-admins\""}} ---- diff --git a/modules/nodes-nodes-viewing-listing.adoc b/modules/nodes-nodes-viewing-listing.adoc index 6c8090d39c..17cc9ffe1b 100644 --- a/modules/nodes-nodes-viewing-listing.adoc +++ b/modules/nodes-nodes-viewing-listing.adoc @@ -13,9 +13,9 @@ You can get detailed information on the nodes in the cluster. $ oc get nodes NAME STATUS ROLES AGE VERSION -master.example.com Ready master 7h v1.12.4+91d94b671b -node1.example.com Ready worker 7h v1.12.4+91d94b671b -node2.example.com Ready worker 7h v1.12.4+91d94b671b +master.example.com Ready master 7h v1.13.4+b626c2fe1 +node1.example.com Ready worker 7h v1.13.4+b626c2fe1 +node2.example.com Ready worker 7h v1.13.4+b626c2fe1 ---- * The `-wide` option provides provides additional information on all nodes. @@ -115,8 +115,8 @@ System Info: <9> Operating System: linux Architecture: amd64 Container Runtime Version: cri-o://1.12.5-2.rhaos4.0.gitd4191df.el7-dev - Kubelet Version: v1.12.4+91d94b671b - Kube-Proxy Version: v1.12.4+91d94b671b + Kubelet Version: v1.13.4+b626c2fe1 + Kube-Proxy Version: v1.13.4+b626c2fe1 PodCIDR: 10.128.4.0/24 ProviderID: aws:///us-east-2a/i-04e87b31dc6b3e171 Non-terminated Pods: (13 in total) <10> diff --git a/modules/nodes-nodes-working-evacuating.adoc b/modules/nodes-nodes-working-evacuating.adoc index 02035e1591..3359837fce 100644 --- a/modules/nodes-nodes-working-evacuating.adoc +++ b/modules/nodes-nodes-working-evacuating.adoc @@ -22,7 +22,7 @@ Nodes must first be marked unschedulable to perform pod evacuation. ---- $ oc adm cordon NAME STATUS ROLES AGE VERSION - NotReady,SchedulingDisabled worker 1d v1.12.0+d4cacc0 + NotReady,SchedulingDisabled worker 1d v1.13.4+b626c2fe1 ---- Use `oc uncordon` to mark the node as schedulable when done.