SM
Size: a a a
SM
GM
SM
GM
S
G
## 0.13.1 (August 26, 2020)More
ENHANCEMENTS:
* config: `cidrsubnet` and `cidrhost` now support address extensions of more than 32 bits ([#25517](https://github.com/hashicorp/terraform/issues/25517))
* cli: The directories that Terraform searches b...
DZ
DZ
c
DZ
AS
J
DZ
DZ
AS
G
Version 1.6.2
С
time="2020-08-27T22:30:36Z" level=debug msg="GRPC request: {\"readonly\":true,\"target_path\":\"/var/lib/kubelet/pods/a306c62b-e750-4839-a84e-61c984f80a6a/volumes/kubernetes.io~csi/secrets-store-inline/mount\",\"volume_capability\":{\"AccessType\":{\"Mount\":{}},\"access_mode\":{\"mode\":1}},\"volume_context\":{\"csi.storage.k8s.io/ephemeral\":\"true\",\"csi.storage.k8s.io/pod.name\":\"webapp\",\"csi.storage.k8s.io/pod.namespace\":\"consul\",\"csi.storage.k8s.io/pod.uid\":\"a306c62b-e750-4839-a84e-61c984f80a6a\",\"csi.storage.k8s.io/serviceAccount.name\":\"default\",\"secretProviderClass\":\"vault-database\"},\"volume_id\":\"csi-983084f4579edcc67c5955a87595a180b15a7dd2861b651574601c9bfcf0f0b9\"}"
time="2020-08-27T22:30:36Z" level=debug msg="target /var/lib/kubelet/pods/a306c62b-e750-4839-a84e-61c984f80a6a/volumes/kubernetes.io~csi/secrets-store-inline/mount, volumeId csi-983084f4579edcc67c5955a87595a180b15a7dd2861b651574601c9bfcf0f0b9, attributes map[csi.storage.k8s.io/ephemeral:true csi.storage.k8s.io/pod.name:webapp csi.storage.k8s.io/pod.namespace:consul csi.storage.k8s.io/pod.uid:a306c62b-e750-4839-a84e-61c984f80a6a csi.storage.k8s.io/serviceAccount.name:default secretProviderClass:vault-database], mountflags []"
time="2020-08-27T22:30:36Z" level=debug msg="Calling provider: vault for pod: consul/webapp"
time="2020-08-27T22:30:36Z" level=warning msg="minimum compatible vault provider version not set for pod: a306c62b-e750-4839-a84e-61c984f80a6a, ns: consul"
time="2020-08-27T22:30:36Z" level=info msg="provider command invoked: /etc/kubernetes/secrets-store-csi-providers/vault/provider-vault --attributes [REDACTED] --secrets [REDACTED] [--targetPath /var/lib/kubelet/pods/a306c62b-e750-4839-a84e-61c984f80a6a/volumes/kubernetes.io~csi/secrets-store-inline/mount --permission 420]"
time="2020-08-27T22:30:37Z" level=info msg="time=\"2020-08-27T22:30:36Z\" level=debug msg=NewVaultProvider\ntime=\"2020-08-27T22:30:36Z\" level=debug msg=\"vault: roleName database204\"\ntime=\"2020-08-27T22:30:36Z\" level=debug msg=\"vault: vault address http://10.104.241.116:8200\"\nobjectsStrings: [array:\n - |\n objectPath: \"/db-pass\"\n objectName: \"password\"\n objectVersion: \"\"\n]\nobjects: [[objectPath: \"/db-pass\"\nobjectName: \"password\"\nobjectVersion: \"\"\n]]unmarshal object: [objectPath: \"/db-pass\"\nobjectName: \"password\"\nobjectVersion: \"\"\n]\ntime=\"2020-08-27T22:30:36Z\" level=debug msg=\"vault: reading jwt token.....\"\ntime=\"2020-08-27T22:30:36Z\" level=debug msg=\"vault: performing vault login.....\"\ntime=\"2020-08-27T22:30:36Z\" level=debug msg=\"vault: vault address: http://10.104.241.116:8200/v1/auth/kubernetes/login\\n\"\ntime=\"2020-08-27T22:30:37Z\" level=debug msg=\"vault: getting secrets from vault.....\"\ntime=\"2020-08-27T22:30:37Z\" level=info msg=\"secrets-store csi driver wrote /db-pass at /var/lib/kubelet/pods/a306c62b-e750-4839-a84e-61c984f80a6a/volumes/kubernetes.io~csi/secrets-store-inline/mount\"\n"
time="2020-08-27T22:30:37Z" level=debug msg="GRPC response: {}"
time="2020-08-27T22:30:37Z" level=info msg="reconcile started" node=kuber-aws-11 secretproviderclasspodstatus=consul/webapp-consul-vault-database
С
time="2020-08-27T22:30:37Z" level=info msg="no secret objects defined for spc, nothing to reconcile" node=kuber-aws-11 secretproviderclasspodstatus=consul/webapp-consul-vault-database