Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCM-5479 | ci: Refactor the day 1 creation - supported subnets,proxy,KMS key,security group,auditlog,z|y-1 version #1969

Merged
merged 1 commit into from Apr 30, 2024

Conversation

xueli181114
Copy link
Contributor

@xueli181114 xueli181114 commented Apr 26, 2024

theast-1:*************:secret:rosa-private-key-oidc-i0q5-MqvWhM\n2arstgp06s1nm3tl4ajm9n1hpbvrccbi  true     https://oidc.os1.devshift.org/2arstgp06s1nm3tl4ajm9n1hpbvrccbi  \n2aqsfrsdumjusp79acp05njc4gp616p8  true     https://oidc.os1.devshift.org/2aqsfrsdumjusp79acp05njc4gp616p8  \n2arstemjibtg76grtbo3eqe4grvlaqk5  false    https://oidc-m9f6.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-m9f6-hZTHSs\n2aqhi56c75nuta3i01ahkp0alj3a6ce3  true     https://oidc.os1.devshift.org/2aqhi56c75nuta3i01ahkp0alj3a6ce3  \n29pkqn7c7t7lofhp1iitegpiktb4ugde  true     https://oidc.os1.devshift.org/29pkqn7c7t7lofhp1iitegpiktb4ugde  \n2aqgq4ef64fr1kvgecg5daemvrkeh221  true     https://oidc.os1.devshift.org/2aqgq4ef64fr1kvgecg5daemvrkeh221  \n2aqh22hu3t057nkqdcma5br03g7muvt6  true     https://oidc.os1.devshift.org/2aqh22hu3t057nkqdcma5br03g7muvt6  \n2aru8ovqh94pl5cj3kvjre5ft5qtop16  true     https://oidc.os1.devshift.org/2aru8ovqh94pl5cj3kvjre5ft5qtop16  \n2ascp51e7n8iedjqipabpgr6bcpo7ulq  true     https://oidc.os1.devshift.org/2ascp51e7n8iedjqipabpgr6bcpo7ulq  \n2aqj9fmsm67i25sic9l5rqsu6ajq852t  false    https://oidc-w6n8.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-w6n8-4DhVyz\n2aqja24fua2l583e88bfdqa8mki6qbl4  true     https://oidc.os1.devshift.org/2aqja24fua2l583e88bfdqa8mki6qbl4  \n2arvbei8b90fekjnj1mdurm2tj0oei0g  true     https://oidc.os1.devshift.org/2arvbei8b90fekjnj1mdurm2tj0oei0g  \n2arvbhco9171r9ium5us1ltnpeu7fo1f  false    https://oidc-w6b1.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-w6b1-hjibT2\n2ar4qpm0m2447rfl27dgtlv9snpbonur  true     https://oidc.os1.devshift.org/2ar4qpm0m2447rfl27dgtlv9snpbonur  \n2ar4qsvriie28ucjgi9jpupug36f7jie  false    https://oidc-c9s6.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-c9s6-2hc8jE\n2ar54osibfa1ltes0r2mmlg7qks53bq0  false    https://oidc-q8w9.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-q8w9-zAVDU0\n2ar54r7ejduksmq3d6t998m5k1cjrj4f  true     https://oidc.os1.devshift.org/2ar54r7ejduksmq3d6t998m5k1cjrj4f  \n2ashg66iuhnmkbu8llj06o0tg8f5jrk2  true     https://oidc.os1.devshift.org/2ashg66iuhnmkbu8llj06o0tg8f5jrk2  \n2ashlvka0s4d6hkhp33futq6gf7meacq  true     https://oidc.os1.devshift.org/2ashlvka0s4d6hkhp33futq6gf7meacq  \n2ar5o6s3giuf10kru848imh2nkcag6nq  false    https://oidc-x7e6.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-x7e6-RvZ9rt\n2as06mh762jn5vf88tojlnpcf05ehghs  true     https://oidc.os1.devshift.org/2as06mh762jn5vf88tojlnpcf05ehghs  \n2ashm12nvigtenqg6rmi16s0f0eu87a0  false    https://oidc-c9l8.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-c9l8-KyE6aS\n2aqle7fpmfd1ltpuueugrb67i7gs2rue  true     https://oidc.os1.devshift.org/2aqle7fpmfd1ltpuueugrb67i7gs2rue  \n2as1449lg4soo6hc5fg9n7m02uue8ifv  false    https://oidc-t1i0.s3.us-west-2.amazonaws.com                    arn:aws:secretsmanager:us-west-2:*************:secret:rosa-private-key-oidc-t1i0-xpXmbC\n2aqmkfh93jv231dp2p02p3iqkcsf8bs7  false    https://xueli-elvi7jwb9-oidc-m9x4.s3.us-east-1.amazonaws.com    arn:aws:secretsmanager:us-east-1:*************:secret:rosa-private-key-xueli-elvi7jwb9-oidc-m9x4-toSW7I\n2arhe1m9h02p77v5qkn68io4c8345pdp  true     https://oidc.os1.devshift.org/2arhe1m9h02p77v5qkn68io4c8345pdp  \n2at7203gprssgv9avr59tfgt92242521  true     https://oidc.os1.devshift.org/2at7203gprssgv9avr59tfgt92242521  \n2at7o8g29l09d7dcd52ajs6qi9j81ftj  true     https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj  \n2a4p03chohdanf4pp74u1m4f6ccbveh2  true     https://oidc.os1.devshift.org/2a4p03chohdanf4pp74u1m4f6ccbveh2  \n2ahahnad5otbh2tcsj4crtgmevtggdfi  true     https://oidc.os1.devshift.org/2ahahnad5otbh2tcsj4crtgmevtggdfi  \n2as1mgq30j5n4u5cv4v4pt00j51m3eis  true     https://oidc.os1.devshift.org/2as1mgq30j5n4u5cv4v4pt00j51m3eis  \n2aro3gui9qro514chgn6ndiqtaarnqsa  true     https://oidc.os1.devshift.org/2aro3gui9qro514chgn6ndiqtaarnqsa  \n2aa6vevftb5co79ov2megv53mvvuii2g  true     https://oidc.os1.devshift.org/2aa6vevftb5co79ov2megv53mvvuii2g  \n2anu8amev873taa86783u7nnknaq9s3k  true     https://oidc.os1.devshift.org/2anu8amev873taa86783u7nnknaq9s3k  \n2apqtapb60iqel6oncfo5e5fml0790ds  false    https://oidc-n1h4.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-n1h4-LDab5p\n2apqtndudbjn9m0cn49tqiaevfus0go1  true     https://oidc.os1.devshift.org/2apqtndudbjn9m0cn49tqiaevfus0go1  \n2aps2unb7oousp8bks2c8rrdhla7mjj0  true     https://oidc.os1.devshift.org/2aps2unb7oousp8bks2c8rrdhla7mjj0  \n2aps303r700lmmbmprh5u236gsrtfkk1  false    https://oidc-d6p4.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-d6p4-R9lnex\n2aps690qmj7h8eqm5ush3tc428k40604  true     https://oidc.os1.devshift.org/2aps690qmj7h8eqm5ush3tc428k40604  \n2aps6cfod5274ltbmbkn7gvogo3f098n  false    https://oidc-l9v0.s3.ap-northeast-1.amazonaws.com               arn:aws:secretsmanager:ap-northeast-1:*************:secret:rosa-private-key-oidc-l9v0-FBYSzI\n2as5ge9cpvuh0d7if462jik6lk80v7vo  false    https://oidc-a4d1.s3.us-west-2.amazonaws.com                    arn:aws:secretsmanager:us-west-2:*************:secret:rosa-private-key-oidc-a4d1-FDoLPu\n2aq26frnmomv82pho5k52cpd1d790fdn  true     https://oidc.os1.devshift.org/2aq26frnmomv82pho5k52cpd1d790fdn  \n2arq2kcimd4jigom1kpime4m0ro0f51l  true     https://oidc.os1.devshift.org/2arq2kcimd4jigom1kpime4m0ro0f51l  \n"
time="2024-04-27T17:49:43+08:00" level=info msg="Preparing audit log role with name xueli-oxne63u9g and oidcIssuerURL oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj"
time="2024-04-27T17:49:46+08:00" level=info msg="Create a new role for audit log forwarding: arn:aws:iam::*************:role/xueli-oxne63u9g"
time="2024-04-27T17:49:46+08:00" level=info msg="Got BYOVPC set to true. Going to prepare subnets"
time="2024-04-27T17:49:46+08:00" level=info msg="Starting vpc preparation"
time="2024-04-27 17:49:46" level=info msg="Going to prepare a vpc with name xueli-oxne63u9g, on region us-west-2, with cidr 10.0.0.0/16 "
time="2024-04-27 17:49:47" level=info msg="Going to create vpc and the follow resources on zones: "
time="2024-04-27 17:49:48" level=info msg="Create vpc success vpc-06365cdff0d72f345"
time="2024-04-27 17:49:49" level=info msg="Tag resource vpc-06365cdff0d72f345 successfully"
time="2024-04-27 17:49:49" level=info msg="Created vpc with ID vpc-06365cdff0d72f345"
time="2024-04-27 17:49:49" level=info msg="VPC created on AWS with id: vpc-06365cdff0d72f345"
time="2024-04-27 17:49:49" level=info msg="Modify vpc dns attribute DnsHostnames successfully for vpc-06365cdff0d72f345"
time="2024-04-27 17:49:49" level=info msg="VPC DNS Updated on AWS with id: vpc-06365cdff0d72f345"
time="2024-04-27 17:49:49" level=info msg="Create igw success: igw-0728906c45f7ef627"
time="2024-04-27 17:49:50" level=info msg="Attach igw success: igw-0728906c45f7ef627"
time="2024-04-27 17:49:50" level=info msg="Prepare vpc internetgateway for vpc vpc-06365cdff0d72f345"
time="2024-04-27 17:49:50" level=info msg="Create subnets successfully"
time="2024-04-27 17:49:50" level=info msg="Create vpc chain successfully. Enjoy it."
time="2024-04-27T17:49:50+08:00" level=info msg="VPC preparation finished"
time="2024-04-27T17:49:50+08:00" level=info msg="Got no zones indicated. List the zones and pick from the listed zones"
time="2024-04-27 17:49:50" level=info msg="Going to prepare proper pair of subnets"
time="2024-04-27 17:49:50" level=info msg="Got no public subnet for current zone us-west-2a, going to create one"
time="2024-04-27 17:49:50" level=info msg="Created subnet subnet-00161c749d5587e72 for vpc vpc-06365cdff0d72f345"
time="2024-04-27 17:49:51" level=info msg="Created subnet with ID subnet-00161c749d5587e72"
time="2024-04-27 17:49:52" level=info msg="Associate route table success rtbassoc-00b2c5b263a2f351b"
time="2024-04-27 17:49:52" level=info msg="Create route success for route table: rtb-05b1ef9b83382a350"
time="2024-04-27 17:49:52" level=info msg="Tag resource subnet-00161c749d5587e72 successfully"
time="2024-04-27 17:49:52" level=info msg="Got no proper private subnet for current zone us-west-2a, going to create one"
time="2024-04-27 17:49:53" level=info msg="Created subnet subnet-0fa3af41151a59547 for vpc vpc-06365cdff0d72f345"
time="2024-04-27 17:49:54" level=info msg="Created subnet with ID subnet-0fa3af41151a59547"
time="2024-04-27 17:49:54" level=info msg="Associate route table success rtbassoc-02ebd0afd38ed27d1"
time="2024-04-27 17:49:55" level=info msg="Allocated EIP eipalloc-00e90c581f0f990e7 with ip 44.226.182.169"
time="2024-04-27 17:49:55" level=info msg="Create nat success: nat-0d1ab89f441868623"
time="2024-04-27 17:51:36" level=info msg="Create route success for route table: rtb-0cf0f0a02b7264ebf"
time="2024-04-27 17:51:36" level=info msg="Tag resource subnet-0fa3af41151a59547 successfully"
time="2024-04-27 17:51:36" level=info msg="Going to prepare proper pair of subnets"
time="2024-04-27 17:51:36" level=info msg="Subnet subnet-00161c749d5587e72 in zone: us-west-2a, region us-west-2"
time="2024-04-27 17:51:36" level=info msg="Subnet subnet-0fa3af41151a59547 in zone: us-west-2a, region us-west-2"
time="2024-04-27 17:51:36" level=info msg="Got no public subnet for current zone us-west-2b, going to create one"
time="2024-04-27 17:51:37" level=info msg="Created subnet subnet-0fa1e1d9004f018bc for vpc vpc-06365cdff0d72f345"
time="2024-04-27 17:51:37" level=info msg="Created subnet with ID subnet-0fa1e1d9004f018bc"
time="2024-04-27 17:51:38" level=info msg="Associate route table success rtbassoc-0d06bddd4ff298f73"
time="2024-04-27 17:51:39" level=info msg="Create route success for route table: rtb-08250c700ea576f02"
time="2024-04-27 17:51:39" level=info msg="Tag resource subnet-0fa1e1d9004f018bc successfully"
time="2024-04-27 17:51:39" level=info msg="Got no proper private subnet for current zone us-west-2b, going to create one"
time="2024-04-27 17:51:40" level=info msg="Created subnet subnet-0c879c5e8de65dd49 for vpc vpc-06365cdff0d72f345"
time="2024-04-27 17:51:40" level=info msg="Created subnet with ID subnet-0c879c5e8de65dd49"
time="2024-04-27 17:51:41" level=info msg="Associate route table success rtbassoc-06d406ee2572be712"
time="2024-04-27 17:51:41" level=info msg="Found existing nat gateway: nat-0d1ab89f441868623"
time="2024-04-27 17:51:42" level=info msg="Create route success for route table: rtb-0d657e2182c1c09a0"
time="2024-04-27 17:51:42" level=info msg="Tag resource subnet-0c879c5e8de65dd49 successfully"
time="2024-04-27 17:51:42" level=info msg="Going to prepare proper pair of subnets"
time="2024-04-27 17:51:42" level=info msg="Subnet subnet-00161c749d5587e72 in zone: us-west-2a, region us-west-2"
time="2024-04-27 17:51:42" level=info msg="Subnet subnet-0fa3af41151a59547 in zone: us-west-2a, region us-west-2"
time="2024-04-27 17:51:42" level=info msg="Subnet subnet-0fa1e1d9004f018bc in zone: us-west-2b, region us-west-2"
time="2024-04-27 17:51:42" level=info msg="Subnet subnet-0c879c5e8de65dd49 in zone: us-west-2b, region us-west-2"
time="2024-04-27 17:51:42" level=info msg="Got no public subnet for current zone us-west-2c, going to create one"
time="2024-04-27 17:51:43" level=info msg="Created subnet subnet-0b3746af9fde99535 for vpc vpc-06365cdff0d72f345"
time="2024-04-27 17:51:43" level=info msg="Created subnet with ID subnet-0b3746af9fde99535"
time="2024-04-27 17:51:44" level=info msg="Associate route table success rtbassoc-0490889e9b5924959"
time="2024-04-27 17:51:46" level=info msg="Create route success for route table: rtb-038c7a08c16207409"
time="2024-04-27 17:51:46" level=info msg="Tag resource subnet-0b3746af9fde99535 successfully"
time="2024-04-27 17:51:46" level=info msg="Got no proper private subnet for current zone us-west-2c, going to create one"
time="2024-04-27 17:51:47" level=info msg="Created subnet subnet-0ef41849cd1aca8ba for vpc vpc-06365cdff0d72f345"
time="2024-04-27 17:51:48" level=info msg="Created subnet with ID subnet-0ef41849cd1aca8ba"
time="2024-04-27 17:51:48" level=info msg="Associate route table success rtbassoc-0a75fc03e690cb05d"
time="2024-04-27 17:51:48" level=info msg="Found existing nat gateway: nat-0d1ab89f441868623"
time="2024-04-27 17:51:49" level=info msg="Create route success for route table: rtb-0830a36867a1fd2c8"
time="2024-04-27 17:51:50" level=info msg="Tag resource subnet-0ef41849cd1aca8ba successfully"
time="2024-04-27 17:51:50" level=info msg="Create security group sg-0ec8e0eb437120a59 success for vpc-06365cdff0d72f345"
time="2024-04-27 17:51:51" level=info msg="Tag resource sg-0ec8e0eb437120a59 successfully"
time="2024-04-27 17:51:51" level=info msg="Created tagged security group with ID sg-0ec8e0eb437120a59"
time="2024-04-27 17:51:51" level=info msg="Authorize security group success sg-0ec8e0eb437120a59"
time="2024-04-27 17:51:51" level=info msg="Authorize security group success sg-0ec8e0eb437120a59"
time="2024-04-27 17:51:51" level=info msg="Authorize SG sg-0ec8e0eb437120a59 prepared successfully for proxy."
time="2024-04-27 17:51:53" level=info msg="Waiting for below instances ready: i-0cc7d548807b1f21e"
time="2024-04-27 17:51:53" level=info msg="Check instances status of i-0cc7d548807b1f21e"
time="2024-04-27 17:51:53" level=info msg="Instance ID i-0cc7d548807b1f21e is in status of not-applicable"
time="2024-04-27 17:51:53" level=info msg="Instance ID i-0cc7d548807b1f21e is in state of pending"
time="2024-04-27 17:52:53" level=info msg="Check instances status of i-0cc7d548807b1f21e"
time="2024-04-27 17:52:53" level=info msg="Instance ID i-0cc7d548807b1f21e is in status of initializing"
time="2024-04-27 17:52:53" level=info msg="Instance ID i-0cc7d548807b1f21e is in state of running"
time="2024-04-27 17:52:53" level=info msg="All instances running"
time="2024-04-27 17:52:53" level=info msg="Launch proxy instance i-0cc7d548807b1f21e succeed"
time="2024-04-27 17:52:54" level=info msg="Tag resource i-0cc7d548807b1f21e successfully"
time="2024-04-27 17:52:54" level=info msg="Allocated EIP eipalloc-0214eb0225558c970 with ip 44.225.255.204"
time="2024-04-27 17:52:54" level=info msg="Successfully allocated EIP: 44.225.255.204"
time="2024-04-27 17:52:55" level=info msg="Successfully allocated 44.225.255.204 with instance i-0cc7d548807b1f21e.\n\tallocation id: eipalloc-0214eb0225558c970, association id: eipassoc-0ac36b9a3fc6a2922\n"
time="2024-04-27 17:52:55" level=info msg="Prepare EIP successfully for the proxy preparation. Launch with IP: 44.225.255.204"
time="2024-04-27 17:55:00" level=info msg="Preparing OCM testing kms key"
time="2024-04-27 17:55:03" level=info msg="Preparing OCM testing kms key"
time="2024-04-27T17:55:06+08:00" level=info msg="User data and flags preparation finished"
time="2024-04-27T17:55:06+08:00" level=info msg="Running command: rosa create cluster -c xueli-oxne63u9g --version 4.15.11 --channel-group candidate --region us-west-2 --role-arn arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role --support-role-arn arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role --worker-iam-role arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role --oidc-config-id 2at7o8g29l09d7dcd52ajs6qi9j81ftj --operator-roles-prefix xueli-oxne63u9g --audit-log-arn arn:aws:iam::*************:role/xueli-oxne63u9g --enable-autoscaling --min-replicas 3 --max-replicas 6 --machine-cidr 10.0.0.0/16 --service-cidr 172.31.0.0/24 --pod-cidr 192.168.0.0/18 --host-prefix 25 --subnet-ids subnet-0fa3af41151a59547,subnet-0c879c5e8de65dd49,subnet-0ef41849cd1aca8ba,subnet-00161c749d5587e72,subnet-0fa1e1d9004f018bc,subnet-0b3746af9fde99535 --http-proxy http://10.0.0.210:8080 --https-proxy https://10.0.0.210:8080 --no-proxy quay.io --additional-trust-bundle-file /Users/lixue/SHARED_DIR/proxy-bundle.ca --disable-workload-monitoring --etcd-encryption-kms-arn arn:aws:kms:us-west-2:*************:key/e7880fd0-b89a-4bd1-83d0-5240fd0bf437 --etcd-encryption --hosted-cp --compute-machine-type c5.xlarge --kms-key-arn arn:aws:kms:us-west-2:*************:key/c5f17383-98d7-450b-9ab6-74bda5bb40ee --enable-customer-managed-key --multi-az --tags test-tag:tagvalue,qe-managed:true"
time="2024-04-27T17:55:47+08:00" level=info msg="Get Combining Stdout and Stder is :\nINFO: Using '301721915996' as billing account\nINFO: To use a different billing account, add --billing-account ************* to previous command\nWARN: Hosted clusters deprecate the --multi-az flag. The hosted control plane will be MultiAZ, machinepools will be created in the different private subnets provided under --subnet-ids flag.\nINFO: Creating cluster 'xueli-oxne63u9g'\nINFO: To view a list of clusters and their status, run 'rosa list clusters'\nINFO: Cluster 'xueli-oxne63u9g' has been created.\nINFO: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.\n\x1b[0;33mW:\x1b[m Region flag will be removed from this command in future versions\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        Not ready\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    \nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      waiting (Waiting for user action)\nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\nINFO: To determine when your cluster is Ready, run 'rosa describe cluster -c xueli-oxne63u9g'.\nINFO: To watch your cluster installation logs, run 'rosa logs install -c xueli-oxne63u9g --watch'.\n"
time="2024-04-27T17:55:47+08:00" level=info msg="Cluster created succesfully"
time="2024-04-27T17:55:47+08:00" level=info msg="Running command: rosa describe cluster -c xueli-oxne63u9g"
time="2024-04-27T17:55:54+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        Not ready\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    \nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      waiting (Waiting for user action)\nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T17:55:54+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5 --output json"
time="2024-04-27T17:55:58+08:00" level=info msg="Get Combining Stdout and Stder is :\n{\n  \"additional_trust_bundle\": \"REDACTED\",\n  \"addons\": {\n    \"items\": []\n  },\n  \"api\": {\n    \"listening\": \"external\"\n  },\n  \"aws\": {\n    \"audit_log\": {\n      \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g\"\n    },\n    \"billing_account_id\": \"301721915996\",\n    \"ec2_metadata_http_tokens\": \"\",\n    \"etcd_encryption\": {\n      \"kms_key_arn\": \"arn:aws:kms:us-west-2:*************:key/e7880fd0-b89a-4bd1-83d0-5240fd0bf437\"\n    },\n    \"kms_key_arn\": \"arn:aws:kms:us-west-2:*************:key/c5f17383-98d7-450b-9ab6-74bda5bb40ee\",\n    \"private_link\": false,\n    \"private_link_configuration\": {},\n    \"sts\": {\n      \"auto_mode\": false,\n      \"enabled\": true,\n      \"instance_iam_roles\": {\n        \"worker_role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\"\n      },\n      \"managed_policies\": true,\n      \"oidc_config\": {\n        \"creation_timestamp\": \"2024-04-27T09:49:22Z\",\n        \"href\": \"/api/clusters_mgmt/v1/oidc_configs/2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n        \"id\": \"2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n        \"issuer_url\": \"https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n        \"last_update_timestamp\": \"2024-04-27T09:55:41Z\",\n        \"last_used_timestamp\": \"2024-04-27T09:55:41Z\",\n        \"managed\": true,\n        \"organization_id\": \"1jlfDskrR39egznAq3T18Ul0Xxv\",\n        \"reusable\": true\n      },\n      \"oidc_endpoint_url\": \"https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n      \"operator_iam_roles\": [\n        {\n          \"id\": \"\",\n          \"name\": \"installer-cloud-credentials\",\n          \"namespace\": \"openshift-image-registry\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"cloud-credentials\",\n          \"namespace\": \"openshift-ingress-operator\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"ebs-cloud-credentials\",\n          \"namespace\": \"openshift-cluster-csi-drivers\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"cloud-credentials\",\n          \"namespace\": \"openshift-cloud-network-config-controller\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"capa-controller-manager\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"control-plane-operator\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"kms-provider\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"kube-controller-manager\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\",\n          \"service_account\": \"\"\n        }\n      ],\n      \"operator_role_prefix\": \"xueli-oxne63u9g\",\n      \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\",\n      \"support_role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\"\n    },\n    \"subnet_ids\": [\n      \"subnet-0fa3af41151a59547\",\n      \"subnet-0c879c5e8de65dd49\",\n      \"subnet-0ef41849cd1aca8ba\",\n      \"subnet-00161c749d5587e72\",\n      \"subnet-0fa1e1d9004f018bc\",\n      \"subnet-0b3746af9fde99535\"\n    ],\n    \"tags\": {\n      \"qe-managed\": \"true\",\n      \"red-hat-clustertype\": \"rosa\",\n      \"red-hat-managed\": \"true\",\n      \"test-tag\": \"tagvalue\"\n    }\n  },\n  \"aws_infrastructure_access_role_grants\": {\n    \"items\": []\n  },\n  \"billing_model\": \"marketplace-aws\",\n  \"byo_oidc\": {\n    \"enabled\": false\n  },\n  \"ccs\": {\n    \"disable_scp_checks\": false,\n    \"enabled\": true,\n    \"kind\": \"CCS\"\n  },\n  \"cloud_provider\": {\n    \"href\": \"/api/clusters_mgmt/v1/cloud_providers/aws\",\n    \"id\": \"aws\",\n    \"kind\": \"CloudProviderLink\"\n  },\n  \"creation_timestamp\": \"2024-04-27T09:55:41Z\",\n  \"delete_protection\": {\n    \"enabled\": false\n  },\n  \"disable_user_workload_monitoring\": true,\n  \"display_name\": \"xueli-oxne63u9g\",\n  \"domain_prefix\": \"xueli-oxne63u9g\",\n  \"etcd_encryption\": true,\n  \"expiration_timestamp\": \"2024-04-28T21:55:37Z\",\n  \"external_auth_config\": {\n    \"enabled\": false,\n    \"external_auths\": {\n      \"items\": []\n    }\n  },\n  \"external_configuration\": {\n    \"labels\": {\n      \"items\": []\n    },\n    \"manifests\": {\n      \"items\": []\n    },\n    \"syncsets\": {\n      \"items\": []\n    }\n  },\n  \"external_id\": \"ba2309dc-1b33-4066-815c-9bbd71d63f68\",\n  \"flavour\": {\n    \"href\": \"/api/clusters_mgmt/v1/flavours/osd-4\",\n    \"id\": \"osd-4\",\n    \"kind\": \"FlavourLink\"\n  },\n  \"groups\": {\n    \"items\": []\n  },\n  \"href\": \"/api/clusters_mgmt/v1/clusters/2at7r69rb1pshtec3afo6nlj19rtmes5\",\n  \"hypershift\": {\n    \"enabled\": true\n  },\n  \"id\": \"2at7r69rb1pshtec3afo6nlj19rtmes5\",\n  \"identity_providers\": {\n    \"items\": []\n  },\n  \"inflight_checks\": {\n    \"items\": []\n  },\n  \"ingresses\": {\n    \"items\": []\n  },\n  \"kind\": \"Cluster\",\n  \"managed\": true,\n  \"managed_service\": {\n    \"enabled\": false\n  },\n  \"multi_az\": true,\n  \"name\": \"xueli-oxne63u9g\",\n  \"network\": {\n    \"host_prefix\": 25,\n    \"machine_cidr\": \"10.0.0.0/16\",\n    \"pod_cidr\": \"192.168.0.0/18\",\n    \"service_cidr\": \"172.31.0.0/24\",\n    \"type\": \"OVNKubernetes\"\n  },\n  \"node_drain_grace_period\": {\n    \"unit\": \"minutes\",\n    \"value\": 0\n  },\n  \"node_pools\": {\n    \"items\": []\n  },\n  \"nodes\": {\n    \"autoscale_compute\": {\n      \"kind\": \"MachinePoolAutoscaling\",\n      \"max_replicas\": 6,\n      \"min_replicas\": 3\n    },\n    \"availability_zones\": [\n      \"us-west-2a\",\n      \"us-west-2b\",\n      \"us-west-2c\"\n    ],\n    \"compute_machine_type\": {\n      \"href\": \"/api/clusters_mgmt/v1/machine_types/c5.xlarge\",\n      \"id\": \"c5.xlarge\",\n      \"kind\": \"MachineTypeLink\"\n    }\n  },\n  \"openshift_version\": \"4.15.11\",\n  \"product\": {\n    \"href\": \"/api/clusters_mgmt/v1/products/rosa\",\n    \"id\": \"rosa\",\n    \"kind\": \"ProductLink\"\n  },\n  \"properties\": {\n    \"rosa_cli_version\": \"1.2.39\",\n    \"rosa_creator_arn\": \"arn:aws:iam::*************:user/xueli\"\n  },\n  \"proxy\": {\n    \"http_proxy\": \"http://10.0.0.210:8080\",\n    \"https_proxy\": \"https://10.0.0.210:8080\",\n    \"no_proxy\": \"quay.io\"\n  },\n  \"region\": {\n    \"href\": \"/api/clusters_mgmt/v1/cloud_providers/aws/regions/us-west-2\",\n    \"id\": \"us-west-2\",\n    \"kind\": \"CloudRegionLink\"\n  },\n  \"state\": \"waiting\",\n  \"status\": {\n    \"configuration_mode\": \"full\",\n    \"dns_ready\": false,\n    \"kind\": \"ClusterStatus\",\n    \"limited_support_reason_count\": 0,\n    \"oidc_ready\": false,\n    \"provision_error_code\": \"\",\n    \"provision_error_message\": \"\",\n    \"state\": \"waiting\"\n  },\n  \"subscription\": {\n    \"href\": \"/api/accounts_mgmt/v1/subscriptions/2fg9EL3LfTuKKoB4X3UrXULdgwT\",\n    \"id\": \"2fg9EL3LfTuKKoB4X3UrXULdgwT\",\n    \"kind\": \"SubscriptionLink\"\n  },\n  \"version\": {\n    \"channel_group\": \"candidate\",\n    \"end_of_life_timestamp\": \"2025-06-30T00:00:00Z\",\n    \"href\": \"/api/clusters_mgmt/v1/versions/openshift-v4.15.11-candidate\",\n    \"id\": \"openshift-v4.15.11-candidate\",\n    \"kind\": \"Version\",\n    \"raw_id\": \"4.15.11\"\n  }\n}\n"
time="2024-04-27 17:55:58" level=info msg="Configuring sts roles to key polilies of arn:aws:kms:us-west-2:301721915996:key/c5f17383-98d7-450b-9ab6-74bda5bb40ee"
time="2024-04-27T17:56:00+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5 --output json"
time="2024-04-27T17:56:03+08:00" level=info msg="Get Combining Stdout and Stder is :\n{\n  \"additional_trust_bundle\": \"REDACTED\",\n  \"addons\": {\n    \"items\": []\n  },\n  \"api\": {\n    \"listening\": \"external\"\n  },\n  \"aws\": {\n    \"audit_log\": {\n      \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g\"\n    },\n    \"billing_account_id\": \"301721915996\",\n    \"ec2_metadata_http_tokens\": \"\",\n    \"etcd_encryption\": {\n      \"kms_key_arn\": \"arn:aws:kms:us-west-2:*************:key/e7880fd0-b89a-4bd1-83d0-5240fd0bf437\"\n    },\n    \"kms_key_arn\": \"arn:aws:kms:us-west-2:*************:key/c5f17383-98d7-450b-9ab6-74bda5bb40ee\",\n    \"private_link\": false,\n    \"private_link_configuration\": {},\n    \"sts\": {\n      \"auto_mode\": false,\n      \"enabled\": true,\n      \"instance_iam_roles\": {\n        \"worker_role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\"\n      },\n      \"managed_policies\": true,\n      \"oidc_config\": {\n        \"creation_timestamp\": \"2024-04-27T09:49:22Z\",\n        \"href\": \"/api/clusters_mgmt/v1/oidc_configs/2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n        \"id\": \"2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n        \"issuer_url\": \"https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n        \"last_update_timestamp\": \"2024-04-27T09:55:41Z\",\n        \"last_used_timestamp\": \"2024-04-27T09:55:41Z\",\n        \"managed\": true,\n        \"organization_id\": \"1jlfDskrR39egznAq3T18Ul0Xxv\",\n        \"reusable\": true\n      },\n      \"oidc_endpoint_url\": \"https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj\",\n      \"operator_iam_roles\": [\n        {\n          \"id\": \"\",\n          \"name\": \"installer-cloud-credentials\",\n          \"namespace\": \"openshift-image-registry\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"cloud-credentials\",\n          \"namespace\": \"openshift-ingress-operator\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"ebs-cloud-credentials\",\n          \"namespace\": \"openshift-cluster-csi-drivers\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"cloud-credentials\",\n          \"namespace\": \"openshift-cloud-network-config-controller\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"capa-controller-manager\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"control-plane-operator\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"kms-provider\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\",\n          \"service_account\": \"\"\n        },\n        {\n          \"id\": \"\",\n          \"name\": \"kube-controller-manager\",\n          \"namespace\": \"kube-system\",\n          \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\",\n          \"service_account\": \"\"\n        }\n      ],\n      \"operator_role_prefix\": \"xueli-oxne63u9g\",\n      \"role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\",\n      \"support_role_arn\": \"arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\"\n    },\n    \"subnet_ids\": [\n      \"subnet-0fa3af41151a59547\",\n      \"subnet-0c879c5e8de65dd49\",\n      \"subnet-0ef41849cd1aca8ba\",\n      \"subnet-00161c749d5587e72\",\n      \"subnet-0fa1e1d9004f018bc\",\n      \"subnet-0b3746af9fde99535\"\n    ],\n    \"tags\": {\n      \"qe-managed\": \"true\",\n      \"red-hat-clustertype\": \"rosa\",\n      \"red-hat-managed\": \"true\",\n      \"test-tag\": \"tagvalue\"\n    }\n  },\n  \"aws_infrastructure_access_role_grants\": {\n    \"items\": []\n  },\n  \"billing_model\": \"marketplace-aws\",\n  \"byo_oidc\": {\n    \"enabled\": false\n  },\n  \"ccs\": {\n    \"disable_scp_checks\": false,\n    \"enabled\": true,\n    \"kind\": \"CCS\"\n  },\n  \"cloud_provider\": {\n    \"href\": \"/api/clusters_mgmt/v1/cloud_providers/aws\",\n    \"id\": \"aws\",\n    \"kind\": \"CloudProviderLink\"\n  },\n  \"creation_timestamp\": \"2024-04-27T09:55:41Z\",\n  \"delete_protection\": {\n    \"enabled\": false\n  },\n  \"disable_user_workload_monitoring\": true,\n  \"display_name\": \"xueli-oxne63u9g\",\n  \"domain_prefix\": \"xueli-oxne63u9g\",\n  \"etcd_encryption\": true,\n  \"expiration_timestamp\": \"2024-04-28T21:55:37Z\",\n  \"external_auth_config\": {\n    \"enabled\": false,\n    \"external_auths\": {\n      \"items\": []\n    }\n  },\n  \"external_configuration\": {\n    \"labels\": {\n      \"items\": []\n    },\n    \"manifests\": {\n      \"items\": []\n    },\n    \"syncsets\": {\n      \"items\": []\n    }\n  },\n  \"external_id\": \"ba2309dc-1b33-4066-815c-9bbd71d63f68\",\n  \"flavour\": {\n    \"href\": \"/api/clusters_mgmt/v1/flavours/osd-4\",\n    \"id\": \"osd-4\",\n    \"kind\": \"FlavourLink\"\n  },\n  \"groups\": {\n    \"items\": []\n  },\n  \"href\": \"/api/clusters_mgmt/v1/clusters/2at7r69rb1pshtec3afo6nlj19rtmes5\",\n  \"hypershift\": {\n    \"enabled\": true\n  },\n  \"id\": \"2at7r69rb1pshtec3afo6nlj19rtmes5\",\n  \"identity_providers\": {\n    \"items\": []\n  },\n  \"inflight_checks\": {\n    \"items\": []\n  },\n  \"ingresses\": {\n    \"items\": []\n  },\n  \"kind\": \"Cluster\",\n  \"managed\": true,\n  \"managed_service\": {\n    \"enabled\": false\n  },\n  \"multi_az\": true,\n  \"name\": \"xueli-oxne63u9g\",\n  \"network\": {\n    \"host_prefix\": 25,\n    \"machine_cidr\": \"10.0.0.0/16\",\n    \"pod_cidr\": \"192.168.0.0/18\",\n    \"service_cidr\": \"172.31.0.0/24\",\n    \"type\": \"OVNKubernetes\"\n  },\n  \"node_drain_grace_period\": {\n    \"unit\": \"minutes\",\n    \"value\": 0\n  },\n  \"node_pools\": {\n    \"items\": []\n  },\n  \"nodes\": {\n    \"autoscale_compute\": {\n      \"kind\": \"MachinePoolAutoscaling\",\n      \"max_replicas\": 6,\n      \"min_replicas\": 3\n    },\n    \"availability_zones\": [\n      \"us-west-2a\",\n      \"us-west-2b\",\n      \"us-west-2c\"\n    ],\n    \"compute_machine_type\": {\n      \"href\": \"/api/clusters_mgmt/v1/machine_types/c5.xlarge\",\n      \"id\": \"c5.xlarge\",\n      \"kind\": \"MachineTypeLink\"\n    }\n  },\n  \"openshift_version\": \"4.15.11\",\n  \"product\": {\n    \"href\": \"/api/clusters_mgmt/v1/products/rosa\",\n    \"id\": \"rosa\",\n    \"kind\": \"ProductLink\"\n  },\n  \"properties\": {\n    \"rosa_cli_version\": \"1.2.39\",\n    \"rosa_creator_arn\": \"arn:aws:iam::*************:user/xueli\"\n  },\n  \"proxy\": {\n    \"http_proxy\": \"http://10.0.0.210:8080\",\n    \"https_proxy\": \"https://10.0.0.210:8080\",\n    \"no_proxy\": \"quay.io\"\n  },\n  \"region\": {\n    \"href\": \"/api/clusters_mgmt/v1/cloud_providers/aws/regions/us-west-2\",\n    \"id\": \"us-west-2\",\n    \"kind\": \"CloudRegionLink\"\n  },\n  \"state\": \"waiting\",\n  \"status\": {\n    \"configuration_mode\": \"full\",\n    \"dns_ready\": false,\n    \"kind\": \"ClusterStatus\",\n    \"limited_support_reason_count\": 0,\n    \"oidc_ready\": false,\n    \"provision_error_code\": \"\",\n    \"provision_error_message\": \"\",\n    \"state\": \"waiting\"\n  },\n  \"subscription\": {\n    \"href\": \"/api/accounts_mgmt/v1/subscriptions/2fg9EL3LfTuKKoB4X3UrXULdgwT\",\n    \"id\": \"2fg9EL3LfTuKKoB4X3UrXULdgwT\",\n    \"kind\": \"SubscriptionLink\"\n  },\n  \"version\": {\n    \"channel_group\": \"candidate\",\n    \"end_of_life_timestamp\": \"2025-06-30T00:00:00Z\",\n    \"href\": \"/api/clusters_mgmt/v1/versions/openshift-v4.15.11-candidate\",\n    \"id\": \"openshift-v4.15.11-candidate\",\n    \"kind\": \"Version\",\n    \"raw_id\": \"4.15.11\"\n  }\n}\n"
time="2024-04-27 17:56:03" level=info msg="Configuring sts roles to key polilies of arn:aws:kms:us-west-2:301721915996:key/e7880fd0-b89a-4bd1-83d0-5240fd0bf437"
time="2024-04-27T17:56:05+08:00" level=info msg="Waiting for the cluster 2at7r69rb1pshtec3afo6nlj19rtmes5 to ready"
time="2024-04-27T17:56:05+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5"
time="2024-04-27T17:56:13+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        Not ready\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    \nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      validating \nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T17:58:13+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5"
time="2024-04-27T17:58:18+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        Not ready\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    \nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      validating \nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T18:00:18+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5"
time="2024-04-27T18:00:23+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        xueli-oxne63u9g.93bf.s3.devshift.org\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    \nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      installing (Cluster is installing)\nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T18:02:23+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5"
time="2024-04-27T18:02:30+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        xueli-oxne63u9g.93bf.s3.devshift.org\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    \nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      installing (Cluster is installing)\nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T18:04:30+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5"
time="2024-04-27T18:04:35+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        xueli-oxne63u9g.93bf.s3.devshift.org\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    https://api.xueli-oxne63u9g.93bf.s3.devshift.org:443\nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      installing (Cluster is installing)\nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T18:06:35+08:00" level=info msg="Running command: rosa describe cluster -c 2at7r69rb1pshtec3afo6nlj19rtmes5"
time="2024-04-27T18:06:40+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        xueli-oxne63u9g.93bf.s3.devshift.org\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    https://api.xueli-oxne63u9g.93bf.s3.devshift.org:443\nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      ready \nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T18:06:40+08:00" level=info msg="Cluster 2at7r69rb1pshtec3afo6nlj19rtmes5 is ready now."
time="2024-04-27T18:06:40+08:00" level=info msg="Running command: rosa describe cluster -c xueli-oxne63u9g"
time="2024-04-27T18:06:45+08:00" level=info msg="Get Combining Stdout and Stder is :\n\nName:                       xueli-oxne63u9g\nDomain Prefix:              xueli-oxne63u9g\nDisplay Name:               xueli-oxne63u9g\nID:                         2at7r69rb1pshtec3afo6nlj19rtmes5\nExternal ID:                ba2309dc-1b33-4066-815c-9bbd71d63f68\nControl Plane:              ROSA Service Hosted\nOpenShift Version:          4.15.11\nChannel Group:              candidate\nDNS:                        xueli-oxne63u9g.93bf.s3.devshift.org\nAWS Account:                *************\nAWS Billing Account:        *************\nAPI URL:                    https://api.xueli-oxne63u9g.93bf.s3.devshift.org:443\nConsole URL:                \nRegion:                     us-west-2\nAvailability:\n - Control Plane:           MultiAZ\n - Data Plane:              MultiAZ\n\nNodes:\n - Compute (Autoscaled):    3-6\n - Compute (current):       0\nNetwork:\n - Type:                    OVNKubernetes\n - Service CIDR:            172.31.0.0/24\n - Machine CIDR:            10.0.0.0/16\n - Pod CIDR:                192.168.0.0/18\n - Host Prefix:             /25\n - Subnets:                 subnet-0fa3af41151a59547, subnet-0c879c5e8de65dd49, subnet-0ef41849cd1aca8ba, subnet-00161c749d5587e72, subnet-0fa1e1d9004f018bc, subnet-0b3746af9fde99535\nProxy:\n - HTTPProxy:               http://10.0.0.210:8080\n - HTTPSProxy:              https://10.0.0.210:8080\n - NoProxy:                 quay.io\nAdditional trust bundle:    REDACTED\nEC2 Metadata Http Tokens:   optional\nRole (STS) ARN:             arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Installer-Role\nSupport Role ARN:           arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Support-Role\nInstance IAM Roles:\n - Worker:                  arn:aws:iam::*************:role/xueli-oxne63u9g-HCP-ROSA-Worker-Role\nOperator IAM Roles:\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-image-registry-installer-cloud-credent\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-ingress-operator-cloud-credentials\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cluster-csi-drivers-ebs-cloud-credenti\n - arn:aws:iam::*************:role/xueli-oxne63u9g-openshift-cloud-network-config-controller-cloud-\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-capa-controller-manager\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-control-plane-operator\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kms-provider\n - arn:aws:iam::*************:role/xueli-oxne63u9g-kube-system-kube-controller-manager\nManaged Policies:           Yes\nState:                      ready \nPrivate:                    No\nDelete Protection:          Disabled\nCreated:                    Apr 27 2024 09:55:41 UTC\nUser Workload Monitoring:   Disabled\nDetails Page:               https://qaprodauth.console.redhat.com/openshift/details/s/2fg9EL3LfTuKKoB4X3UrXULdgwT\nOIDC Endpoint URL:          https://oidc.os1.devshift.org/2at7o8g29l09d7dcd52ajs6qi9j81ftj (Managed)\nAudit Log Forwarding:       Enabled\nExternal Authentication:    Disabled\nAudit Log Role ARN:         arn:aws:iam::*************:role/xueli-oxne63u9g\n\n"
time="2024-04-27T18:06:45+08:00" level=info msg="Going to record the necessary information"
time="2024-04-27T18:06:45+08:00" level=info msg="Cluster prepared successfully with id 2at7r69rb1pshtec3afo6nlj19rtmes5"

@xueli181114 xueli181114 marked this pull request as draft April 26, 2024 03:21
@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Apr 26, 2024
go.mod Outdated Show resolved Hide resolved
tests/utils/profilehandler/data_preparation.go Outdated Show resolved Hide resolved
tests/utils/profilehandler/interface.go Show resolved Hide resolved
tests/utils/profilehandler/profile_handler.go Outdated Show resolved Hide resolved
tests/utils/profilehandler/profile_handler.go Outdated Show resolved Hide resolved
@xueli181114 xueli181114 marked this pull request as ready for review April 26, 2024 12:28
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Apr 26, 2024
@xueli181114 xueli181114 force-pushed the dummyfunc branch 2 times, most recently from 09a80d7 to 9fefed9 Compare April 26, 2024 12:52
Copy link

codecov bot commented Apr 26, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 23.71%. Comparing base (889f4dc) to head (df308fd).
Report is 19 commits behind head on master.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #1969      +/-   ##
==========================================
+ Coverage   23.52%   23.71%   +0.18%     
==========================================
  Files         137      138       +1     
  Lines       21284    21558     +274     
==========================================
+ Hits         5008     5113     +105     
- Misses      15905    16034     +129     
- Partials      371      411      +40     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@xueli181114
Copy link
Contributor Author

/assign @ciaranRoche @hunterkepley

@xueli181114 xueli181114 changed the title OCM-5479 | ci: Refactor the day 1 creation - supported subnets,proxy,KMS key,security group OCM-5479 | ci: Refactor the day 1 creation - supported subnets,proxy,KMS key,security group,auditlog Apr 27, 2024
@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Apr 28, 2024
@openshift-merge-robot openshift-merge-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Apr 28, 2024
@yasun1
Copy link
Contributor

yasun1 commented Apr 28, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Apr 28, 2024
Copy link
Member

@ciaranRoche ciaranRoche left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One small NP but other than that LGTM

tests/utils/profilehandler/data_preparation.go Outdated Show resolved Hide resolved
…KMS key,security group,audit log, version y,z-1

Fix the comment
@xueli181114 xueli181114 changed the title OCM-5479 | ci: Refactor the day 1 creation - supported subnets,proxy,KMS key,security group,auditlog OCM-5479 | ci: Refactor the day 1 creation - supported subnets,proxy,KMS key,security group,auditlog,z|y-1 version Apr 29, 2024
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Apr 29, 2024
@xueli181114
Copy link
Contributor Author

/retest

@yasun1
Copy link
Contributor

yasun1 commented Apr 30, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Apr 30, 2024
@ciaranRoche
Copy link
Member

/lgtm

@ciaranRoche
Copy link
Member

/approved

Copy link
Contributor

openshift-ci bot commented Apr 30, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ciaranRoche, xueli181114, yasun1

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 30, 2024
Copy link
Contributor

openshift-ci bot commented Apr 30, 2024

@xueli181114: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit 0ab78f9 into openshift:master Apr 30, 2024
10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants