diff --git a/pkg/proxy/config/config.go b/pkg/proxy/config/config.go index 0a2bd65f3e5..03256f040d9 100644 --- a/pkg/proxy/config/config.go +++ b/pkg/proxy/config/config.go @@ -207,7 +207,7 @@ func (c *ServiceConfig) Run(stopCh <-chan struct{}) { } for i := range c.eventHandlers { - glog.V(3).Infof("Calling handler.OnServiceSynced()") + glog.V(3).Info("Calling handler.OnServiceSynced()") c.eventHandlers[i].OnServiceSynced() } @@ -221,7 +221,7 @@ func (c *ServiceConfig) handleAddService(obj interface{}) { return } for i := range c.eventHandlers { - glog.V(4).Infof("Calling handler.OnServiceAdd") + glog.V(4).Info("Calling handler.OnServiceAdd") c.eventHandlers[i].OnServiceAdd(service) } } @@ -238,7 +238,7 @@ func (c *ServiceConfig) handleUpdateService(oldObj, newObj interface{}) { return } for i := range c.eventHandlers { - glog.V(4).Infof("Calling handler.OnServiceUpdate") + glog.V(4).Info("Calling handler.OnServiceUpdate") c.eventHandlers[i].OnServiceUpdate(oldService, service) } } @@ -257,7 +257,7 @@ func (c *ServiceConfig) handleDeleteService(obj interface{}) { } } for i := range c.eventHandlers { - glog.V(4).Infof("Calling handler.OnServiceDelete") + glog.V(4).Info("Calling handler.OnServiceDelete") c.eventHandlers[i].OnServiceDelete(service) } } diff --git a/pkg/proxy/healthcheck/healthcheck.go b/pkg/proxy/healthcheck/healthcheck.go index 93e5edf6112..0c59a38cf79 100644 --- a/pkg/proxy/healthcheck/healthcheck.go +++ b/pkg/proxy/healthcheck/healthcheck.go @@ -322,7 +322,7 @@ func (hs *HealthzServer) Run() { glog.Errorf("Healthz closed with error: %v", err) return } - glog.Errorf("Unexpected healthz closed.") + glog.Error("Unexpected healthz closed.") }, nodeHealthzRetryInterval, wait.NeverStop) } diff --git a/pkg/proxy/iptables/proxier.go b/pkg/proxy/iptables/proxier.go index 470916ce705..697f5bdecc1 100644 --- a/pkg/proxy/iptables/proxier.go +++ b/pkg/proxy/iptables/proxier.go @@ -182,7 +182,7 @@ func newEndpointInfo(baseInfo *proxy.BaseEndpointInfo) proxy.Endpoint { func (e *endpointsInfo) Equal(other proxy.Endpoint) bool { o, ok := other.(*endpointsInfo) if !ok { - glog.Errorf("Failed to cast endpointsInfo") + glog.Error("Failed to cast endpointsInfo") return false } return e.Endpoint == o.Endpoint && @@ -300,7 +300,7 @@ func NewProxier(ipt utiliptables.Interface, // are connected to a Linux bridge (but not SDN bridges). Until most // plugins handle this, log when config is missing if val, err := sysctl.GetSysctl(sysctlBridgeCallIPTables); err == nil && val != 1 { - glog.Warningf("missing br-netfilter module or unset sysctl br-nf-call-iptables; proxy may not work as intended") + glog.Warning("missing br-netfilter module or unset sysctl br-nf-call-iptables; proxy may not work as intended") } // Generate the masquerade mark to use for SNAT rules. @@ -308,12 +308,12 @@ func NewProxier(ipt utiliptables.Interface, masqueradeMark := fmt.Sprintf("%#08x/%#08x", masqueradeValue, masqueradeValue) if nodeIP == nil { - glog.Warningf("invalid nodeIP, initializing kube-proxy with 127.0.0.1 as nodeIP") + glog.Warning("invalid nodeIP, initializing kube-proxy with 127.0.0.1 as nodeIP") nodeIP = net.ParseIP("127.0.0.1") } if len(clusterCIDR) == 0 { - glog.Warningf("clusterCIDR not specified, unable to distinguish between internal and external traffic") + glog.Warning("clusterCIDR not specified, unable to distinguish between internal and external traffic") } else if utilnet.IsIPv6CIDR(clusterCIDR) != ipt.IsIpv6() { return nil, fmt.Errorf("clusterCIDR %s has incorrect IP version: expect isIPv6=%t", clusterCIDR, ipt.IsIpv6()) } @@ -657,7 +657,7 @@ func (proxier *Proxier) syncProxyRules() { } } - glog.V(3).Infof("Syncing iptables rules") + glog.V(3).Info("Syncing iptables rules") // Create and link the kube chains. for _, chain := range iptablesJumpChains {