2025-06-19 23:12:41,575 - xtesting.ci.run_tests - INFO - Deployment description: +-------------------------+------------------------------------------------------------+ | ENV VAR | VALUE | +-------------------------+------------------------------------------------------------+ | CI_LOOP | daily | | DEBUG | false | | DEPLOY_SCENARIO | k8-nosdn-nofeature-noha | | INSTALLER_TYPE | unknown | | BUILD_TAG | 02NTVFC1O3X4 | | NODE_NAME | v1.31 | | TEST_DB_URL | http://testresults.opnfv.org/test/api/v1/results | | TEST_DB_EXT_URL | http://testresults.opnfv.org/test/api/v1/results | | S3_ENDPOINT_URL | https://storage.googleapis.com | | S3_DST_URL | s3://artifacts.opnfv.org/functest- | | | kubernetes/02NTVFC1O3X4/functest-kubernetes-opnfv- | | | functest-kubernetes- | | | cnf-v1.31-cnf_testsuite_workload-run-14 | | HTTP_DST_URL | http://artifacts.opnfv.org/functest- | | | kubernetes/02NTVFC1O3X4/functest-kubernetes-opnfv- | | | functest-kubernetes- | | | cnf-v1.31-cnf_testsuite_workload-run-14 | +-------------------------+------------------------------------------------------------+ 2025-06-19 23:12:41,586 - xtesting.ci.run_tests - INFO - Loading test case 'cnf_testsuite_workload'... 2025-06-19 23:12:41,959 - xtesting.ci.run_tests - INFO - Running test case 'cnf_testsuite_workload'... 2025-06-19 23:12:52,758 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite setup -l debug CNF TestSuite version: v1.4.4 Successfully created directories for cnf-testsuite [2025-06-19 23:12:41] INFO -- CNTI: VERSION: v1.4.4 [2025-06-19 23:12:41] INFO -- CNTI-Setup.cnf_directory_setup: Creating directories for CNTI testsuite [2025-06-19 23:12:41] DEBUG -- CNTI: helm_local_install [2025-06-19 23:12:42] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-06-19 23:12:42] INFO -- CNTI: Globally installed helm satisfies required version. Skipping local helm install. Global helm found. Version: v3.17.0 [2025-06-19 23:12:42] DEBUG -- CNTI: helm_v2?: [2025-06-19 23:12:42] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-06-19 23:12:42] DEBUG -- CNTI-Helm.helm_local_response.cmd: command: /home/xtesting/.cnf-testsuite/tools/helm/linux-amd64/helm version No Local helm version found [2025-06-19 23:12:42] WARN -- CNTI-Helm.helm_local_response.cmd: stderr: sh: line 0: /home/xtesting/.cnf-testsuite/tools/helm/linux-amd64/helm: not found [2025-06-19 23:12:42] DEBUG -- CNTI: helm_v2?: [2025-06-19 23:12:42] DEBUG -- CNTI: helm_v3?: [2025-06-19 23:12:42] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-06-19 23:12:42] DEBUG -- CNTI-Helm.helm_gives_k8s_warning?.cmd: command: helm list Global kubectl found. Version: 1.31 No Local kubectl version found Global git found. Version: 2.45.3 No Local git version found All prerequisites found. KUBECONFIG is set as /home/xtesting/.kube/config. [2025-06-19 23:12:42] INFO -- CNTI-Setup.create_namespace: Creating namespace for CNTI testsuite [2025-06-19 23:12:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:12:42] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-testsuite Created cnf-testsuite namespace on the Kubernetes cluster [2025-06-19 23:12:42] INFO -- CNTI-Setup.create_namespace: cnf-testsuite namespace created [2025-06-19 23:12:42] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-testsuite with pod-security.kubernetes.io/enforce=privileged [2025-06-19 23:12:42] INFO -- CNTI-Setup.configuration_file_setup: Creating configuration file [2025-06-19 23:12:42] DEBUG -- CNTI: install_apisnoop [2025-06-19 23:12:42] INFO -- CNTI: GitClient.clone command: https://github.com/cncf/apisnoop /home/xtesting/.cnf-testsuite/tools/apisnoop [2025-06-19 23:12:49] INFO -- CNTI: GitClient.clone output: [2025-06-19 23:12:49] INFO -- CNTI: GitClient.clone stderr: Cloning into '/home/xtesting/.cnf-testsuite/tools/apisnoop'... [2025-06-19 23:12:49] INFO -- CNTI: url: https://github.com/vmware-tanzu/sonobuoy/releases/download/v0.56.14/sonobuoy_0.56.14_linux_amd64.tar.gz [2025-06-19 23:12:49] INFO -- CNTI: write_file: /home/xtesting/.cnf-testsuite/tools/sonobuoy/sonobuoy.tar.gz [2025-06-19 23:12:49] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:12:50] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:12:51] DEBUG -- CNTI: Sonobuoy Version: v0.56.14 MinimumKubeVersion: 1.17.0 MaximumKubeVersion: 1.99.99 GitSHA: bd5465d6b2b2b92b517f4c6074008d22338ff509 GoVersion: go1.19.4 Platform: linux/amd64 API Version check skipped due to missing `--kubeconfig` or other error [2025-06-19 23:12:51] INFO -- CNTI: install_kind [2025-06-19 23:12:51] INFO -- CNTI: write_file: /home/xtesting/.cnf-testsuite/tools/kind/kind [2025-06-19 23:12:51] INFO -- CNTI: install kind [2025-06-19 23:12:51] INFO -- CNTI: url: https://github.com/kubernetes-sigs/kind/releases/download/v0.27.0/kind-linux-amd64 [2025-06-19 23:12:51] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:12:52] DEBUG -- CNTI-http.client: Performing request Dependency installation complete 2025-06-19 23:13:19,434 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite cnf_install cnf-config=example-cnfs/coredns/cnf-testsuite.yml -l debug Successfully created directories for cnf-testsuite [2025-06-19 23:12:52] INFO -- CNTI-Setup.cnf_directory_setup: Creating directories for CNTI testsuite [2025-06-19 23:12:52] DEBUG -- CNTI: helm_local_install KUBECONFIG is set as /home/xtesting/.kube/config. [2025-06-19 23:12:52] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-06-19 23:12:52] INFO -- CNTI: Globally installed helm satisfies required version. Skipping local helm install. [2025-06-19 23:12:52] INFO -- CNTI-Setup.create_namespace: Creating namespace for CNTI testsuite [2025-06-19 23:12:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:12:52] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-testsuite cnf-testsuite namespace already exists on the Kubernetes cluster [2025-06-19 23:12:53] WARN -- CNTI-KubectlClient.Apply.namespace.cmd: stderr: Error from server (AlreadyExists): namespaces "cnf-testsuite" already exists [2025-06-19 23:12:53] INFO -- CNTI-Setup.create_namespace: cnf-testsuite namespace already exists, not creating [2025-06-19 23:12:53] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-testsuite with pod-security.kubernetes.io/enforce=privileged [2025-06-19 23:12:53] INFO -- CNTI-Setup.cnf_install: Installing CNF to cluster [2025-06-19 23:12:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:12:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:12:53] DEBUG -- CNTI: find output: [2025-06-19 23:12:53] WARN -- CNTI: find stderr: find: installed_cnf_files/*: No such file or directory [2025-06-19 23:12:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: [] [2025-06-19 23:12:53] INFO -- CNTI: ClusterTools install [2025-06-19 23:12:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:12:53] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:12:53] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file cluster_tools.yml [2025-06-19 23:12:53] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": host namespaces (hostNetwork=true, hostPID=true), privileged (container "cluster-tools" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "cluster-tools" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "cluster-tools" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volumes "proc", "systemd", "hostfs" use restricted volume type "hostPath"), runAsNonRoot != true (pod or container "cluster-tools" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "cluster-tools" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:12:53] INFO -- CNTI: ClusterTools wait_for_cluster_tools [2025-06-19 23:12:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:12:53] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:12:53] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Daemonset/cluster-tools to install [2025-06-19 23:12:53] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-06-19 23:12:53] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-06-19 23:12:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools [2025-06-19 23:12:53] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 0 [2025-06-19 23:12:54] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-06-19 23:12:54] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-06-19 23:12:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools [2025-06-19 23:12:55] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-06-19 23:12:55] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-06-19 23:12:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools ClusterTools installed CNF installation start. Installing deployment "coredns". [2025-06-19 23:12:55] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Daemonset/cluster-tools is ready [2025-06-19 23:12:55] DEBUG -- CNTI-CNFInstall.parsed_cli_args: Parsed args: {config_path: "example-cnfs/coredns/cnf-testsuite.yml", timeout: 1800, skip_wait_for_install: false} [2025-06-19 23:12:55] INFO -- CNTI-Helm.helm_repo_add: Adding helm repository: stable [2025-06-19 23:12:55] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-06-19 23:12:55] DEBUG -- CNTI-Helm.helm_repo_add.cmd: command: helm repo add stable https://cncf.gitlab.io/stable [2025-06-19 23:12:56] INFO -- CNTI-Helm.pull: Pulling helm chart: stable/coredns [2025-06-19 23:12:56] DEBUG -- CNTI-Helm.pull.cmd: command: helm pull stable/coredns --untar --destination installed_cnf_files/deployments/coredns [2025-06-19 23:12:57] INFO -- CNTI-CNFManager.ensure_namespace_exists!: Ensure that namespace: cnf-default exists on the cluster for the CNF install [2025-06-19 23:12:57] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-default [2025-06-19 23:12:57] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-default with pod-security.kubernetes.io/enforce=privileged [2025-06-19 23:12:57] INFO -- CNTI-Helm.install: Installing helm chart: installed_cnf_files/deployments/coredns/coredns [2025-06-19 23:12:57] DEBUG -- CNTI-Helm.install: Values: [2025-06-19 23:12:57] DEBUG -- CNTI-Helm.install.cmd: command: helm install coredns installed_cnf_files/deployments/coredns/coredns -n cnf-default [2025-06-19 23:12:57] WARN -- CNTI-Helm.install.cmd: stderr: W0619 23:12:57.910849 480 warnings.go:70] spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead W0619 23:12:57.910890 480 warnings.go:70] would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:12:57] INFO -- CNTI-Helm.generate_manifest: Generating manifest from installed CNF: coredns [2025-06-19 23:12:57] DEBUG -- CNTI-Helm.cmd: command: helm get manifest coredns --namespace cnf-default [2025-06-19 23:12:58] INFO -- CNTI-Helm.generate_manifest: Manifest was generated successfully [2025-06-19 23:12:58] INFO -- CNTI-CNFInstall.add_namespace_to_resources: Updating metadata.namespace field for resources in generated manifest Waiting for resource for "coredns" deployment (1/1): [Deployment] coredns-coredns [2025-06-19 23:12:58] DEBUG -- CNTI-CNFInstall.add_namespace_to_resources: Added cnf-default namespace for resource: {kind: ConfigMap, name: coredns-coredns} [2025-06-19 23:12:58] DEBUG -- CNTI-CNFInstall.add_namespace_to_resources: Added cnf-default namespace for resource: {kind: Service, name: coredns-coredns} [2025-06-19 23:12:58] DEBUG -- CNTI-CNFInstall.add_namespace_to_resources: Added cnf-default namespace for resource: {kind: Deployment, name: coredns-coredns} [2025-06-19 23:12:58] DEBUG -- CNTI-CNFInstall.add_manifest_to_file: coredns manifest was appended into installed_cnf_files/deployments/coredns/deployment_manifest.yml file [2025-06-19 23:12:58] DEBUG -- CNTI-CNFInstall.add_manifest_to_file: coredns manifest was appended into installed_cnf_files/common_manifest.yml file [2025-06-19 23:12:58] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "ConfigMap", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "ClusterRole", name: "coredns-coredns", namespace: "default"}, {kind: "ClusterRoleBinding", name: "coredns-coredns", namespace: "default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:12:58] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Deployment/coredns-coredns to install [2025-06-19 23:12:58] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:12:58] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:12:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:12:58] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 0 [2025-06-19 23:12:59] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:12:59] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:12:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:00] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:00] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:01] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:01] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:02] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:02] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:03] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:03] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:03] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:04] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:04] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:05] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:05] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:07] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:07] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:08] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:08] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:09] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:09] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:09] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 10 [2025-06-19 23:13:10] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:10] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:11] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:11] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:12] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:12] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:13] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:13] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:14] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:14] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:14] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:15] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:15] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:15] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:17] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:17] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:18] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:18] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:18] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:19] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-06-19 23:13:19] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-06-19 23:13:19] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns All "coredns" deployment resources are up. CNF installation complete. [2025-06-19 23:13:19] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Deployment/coredns-coredns is ready [2025-06-19 23:13:19] INFO -- CNTI-Setup.cnf_install: CNF installed successfuly 2025-06-19 23:28:44,289 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite workload -l debug [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" Successfully created directories for cnf-testsuite [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:13:19] INFO -- CNTI-Setup.configuration_file_setup: Creating configuration file [2025-06-19 23:13:19] INFO -- CNTI-Setup.cnf_directory_setup: Creating directories for CNTI testsuite [2025-06-19 23:13:19] DEBUG -- CNTI: helm_local_install [2025-06-19 23:13:19] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-06-19 23:13:19] INFO -- CNTI: Globally installed helm satisfies required version. Skipping local helm install. [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.Results.file: Results file created: results/cnf-testsuite-results-20250619-231319-514.yml [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [helm_chart_valid] [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.task_runner.helm_chart_valid: Starting test [2025-06-19 23:13:19] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-06-19 23:13:19] INFO -- CNTI: Current directory: /src/cnf-testsuite [2025-06-19 23:13:19] INFO -- CNTI-helm_chart_valid: Linting helm chart for deployment: coredns [2025-06-19 23:13:19] INFO -- CNTI-helm_chart_valid: Helm lint command: helm lint /src/cnf-testsuite/installed_cnf_files/deployments/coredns/coredns ✔️ PASSED: [helm_chart_valid] Helm chart lint passed on all charts ⎈📝☑ [2025-06-19 23:13:19] INFO -- CNTI-helm_chart_valid: Helm Lint output: ==> Linting /src/cnf-testsuite/installed_cnf_files/deployments/coredns/coredns 1 chart(s) linted, 0 chart(s) failed [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'helm_chart_valid' emoji: ⎈📝☑ [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_valid' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_valid' type: normal [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_valid' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_valid' type: normal [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.upsert_task-helm_chart_valid: Task start time: 2025-06-19 23:13:19 UTC, end time: 2025-06-19 23:13:19 UTC [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.upsert_task-helm_chart_valid: Task: 'helm_chart_valid' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.177403545 [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [helm_chart_published] [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.task_runner.helm_chart_published: Starting test ✔️ PASSED: [helm_chart_published] All Helm charts are published ⎈📦🌐 [2025-06-19 23:13:19] INFO -- CNTI-helm_chart_published: Searching Helm chart: stable/coredns [2025-06-19 23:13:19] INFO -- CNTI-helm_chart_published: Helm search output: NAME CHART VERSION APP VERSION DESCRIPTION stable/coredns 1.13.8 1.7.1 CoreDNS is a DNS server that chains plugins and... [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'helm_chart_published' emoji: ⎈📦🌐 [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_published' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_published' type: normal [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_published' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_published' type: normal [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.upsert_task-helm_chart_published: Task start time: 2025-06-19 23:13:19 UTC, end time: 2025-06-19 23:13:19 UTC [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.upsert_task-helm_chart_published: Task: 'helm_chart_published' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.086959135 [2025-06-19 23:13:19] DEBUG -- CNTI-helm_deploy: helm_deploy args: # [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [helm_deploy] ✔️ PASSED: [helm_deploy] CNF is installed via helm ⚙🛠️⬆☁ [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.task_runner.helm_deploy: Starting test [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config args: # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:13:19] DEBUG -- CNTI: all cnf: installed_cnf_files [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config cnf: installed_cnf_files [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'helm_deploy' emoji: ⚙🛠️⬆☁ [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_deploy' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_deploy' type: normal [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_deploy' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_deploy' type: normal [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.upsert_task-helm_deploy: Task start time: 2025-06-19 23:13:19 UTC, end time: 2025-06-19 23:13:19 UTC [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.upsert_task-helm_deploy: Task: 'helm_deploy' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.017396284 [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [cni_compatible] ⏭️ SKIPPED: [cni_compatible] cni_compatible test was temporarily disabled, check #2153 🔓🔑 [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.task_runner.cni_compatible: Starting test [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'cni_compatible' emoji: 🔓🔑 [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cni_compatible' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'cni_compatible' type: [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 0 points [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cni_compatible' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points: Task: 'cni_compatible' type: [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Points.upsert_task-cni_compatible: Task start time: 2025-06-19 23:13:19 UTC, end time: 2025-06-19 23:13:19 UTC [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Points.upsert_task-cni_compatible: Task: 'cni_compatible' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.014474746 [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:13:19] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:19] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [increase_decrease_capacity] [2025-06-19 23:13:19] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:13:19] INFO -- CNTI-CNFManager.Task.task_runner.increase_decrease_capacity: Starting test [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:13:19] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:19] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:13:19] INFO -- CNTI-change_capacity:resource: Deployment/coredns-coredns; namespace: cnf-default [2025-06-19 23:13:19] INFO -- CNTI-change_capacity:capacity: Base replicas: 1; Target replicas: 3 [2025-06-19 23:13:19] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 1 replicas [2025-06-19 23:13:19] DEBUG -- CNTI: target_replica_count: 1 [2025-06-19 23:13:20] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:20] DEBUG -- CNTI: Deployment initialized to 1 [2025-06-19 23:13:20] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 3 replicas [2025-06-19 23:13:20] WARN -- CNTI-KubectlClient.Utils.scale.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead [2025-06-19 23:13:20] DEBUG -- CNTI: target_replica_count: 3 [2025-06-19 23:13:20] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:22] DEBUG -- CNTI: Time left: 58 seconds [2025-06-19 23:13:22] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:24] DEBUG -- CNTI: Time left: 56 seconds [2025-06-19 23:13:24] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:26] DEBUG -- CNTI: Time left: 54 seconds [2025-06-19 23:13:26] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:28] DEBUG -- CNTI: Time left: 52 seconds [2025-06-19 23:13:28] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:30] DEBUG -- CNTI: Time left: 50 seconds [2025-06-19 23:13:30] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:33] DEBUG -- CNTI: Time left: 48 seconds [2025-06-19 23:13:33] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:35] DEBUG -- CNTI: Time left: 46 seconds [2025-06-19 23:13:35] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:37] DEBUG -- CNTI: Time left: 44 seconds [2025-06-19 23:13:37] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:39] DEBUG -- CNTI: Time left: 41 seconds [2025-06-19 23:13:39] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:41] DEBUG -- CNTI: Time left: 39 seconds [2025-06-19 23:13:41] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-06-19 23:13:43] DEBUG -- CNTI: Time left: 58 seconds [2025-06-19 23:13:43] DEBUG -- CNTI: current_replicas before get Deployment: 3 [2025-06-19 23:13:43] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:13:43] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:43] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:13:43] INFO -- CNTI-change_capacity:resource: Deployment/coredns-coredns; namespace: cnf-default [2025-06-19 23:13:43] INFO -- CNTI-change_capacity:capacity: Base replicas: 3; Target replicas: 1 [2025-06-19 23:13:43] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 3 replicas [2025-06-19 23:13:43] DEBUG -- CNTI: target_replica_count: 3 [2025-06-19 23:13:43] DEBUG -- CNTI: current_replicas before get Deployment: 3 [2025-06-19 23:13:44] DEBUG -- CNTI: Deployment initialized to 3 [2025-06-19 23:13:44] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 1 replicas [2025-06-19 23:13:44] WARN -- CNTI-KubectlClient.Utils.scale.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead [2025-06-19 23:13:44] DEBUG -- CNTI: target_replica_count: 1 [2025-06-19 23:13:44] DEBUG -- CNTI: current_replicas before get Deployment: 1 ✔️ 🏆PASSED: [increase_decrease_capacity] Replicas increased to 3 and decreased to 1 📦📈📉 [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'increase_decrease_capacity' emoji: 📦📈📉 [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'increase_decrease_capacity' tags: ["compatibility", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.Points: Task: 'increase_decrease_capacity' type: essential [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'increase_decrease_capacity' tags: ["compatibility", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.Points: Task: 'increase_decrease_capacity' type: essential [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.Points.upsert_task-increase_decrease_capacity: Task start time: 2025-06-19 23:13:19 UTC, end time: 2025-06-19 23:13:44 UTC [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.Points.upsert_task-increase_decrease_capacity: Task: 'increase_decrease_capacity' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:24.490297358 [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:13:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:13:44] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:13:44] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:13:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rollback] [2025-06-19 23:13:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.Task.task_runner.rollback: Starting test [2025-06-19 23:13:44] DEBUG -- CNTI-rollback: container_names: [#] [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:13:44] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:13:44] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:13:44] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:13:44] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:13:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:44] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:13:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:13:44] DEBUG -- CNTI-rollback: Rollback: setting new version; resource=Deployment/coredns-coredns; container_name=coredns; image_name=coredns/coredns; image_tag: 1.7.1 [2025-06-19 23:13:44] DEBUG -- CNTI-rollback: rollback: update Deployment/coredns-coredns, container: coredns, image: coredns/coredns, tag: 1.8.0 [2025-06-19 23:13:44] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-06-19 23:13:44] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:13:44] INFO -- CNTI-rollback: rollback version change successful? true [2025-06-19 23:13:44] DEBUG -- CNTI-rollback: rollback: checking status new version [2025-06-19 23:13:44] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns [2025-06-19 23:14:05] DEBUG -- CNTI-rollback: rollback: rolling back to old version [2025-06-19 23:14:05] INFO -- CNTI-KubectlClient.Rollout.undo: Undo rollout of Deployment/coredns-coredns ✔️ PASSED: [rollback] CNF Rollback Passed  [2025-06-19 23:14:05] WARN -- CNTI-KubectlClient.Rollout.undo.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rollback' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points: Task: 'rollback' type: normal [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rollback' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points: Task: 'rollback' type: normal [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points.upsert_task-rollback: Task start time: 2025-06-19 23:13:44 UTC, end time: 2025-06-19 23:14:05 UTC [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Points.upsert_task-rollback: Task: 'rollback' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:20.923000582 [2025-06-19 23:14:05] INFO -- CNTI-Workload.deprecated_k8s_features: Testing CNF for usage of deprecated Kubernetes features [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:05] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:14:05] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:14:05] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:14:05] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:05] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [deprecated_k8s_features] ✔️ PASSED: [deprecated_k8s_features] CNF does not use deprecated K8s features  [2025-06-19 23:14:05] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Task.task_runner.deprecated_k8s_features: Starting test [2025-06-19 23:14:05] INFO -- CNTI-Workload.deprecated_k8s_features: Found 0 deprecated feature warnings [2025-06-19 23:14:05] INFO -- CNTI-Workload.deprecated_k8s_features: CNF does not use any deprecated features [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'deprecated_k8s_features' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points: Task: 'deprecated_k8s_features' type: [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'deprecated_k8s_features' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points: Task: 'deprecated_k8s_features' type: [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Points.upsert_task-deprecated_k8s_features: Task start time: 2025-06-19 23:14:05 UTC, end time: 2025-06-19 23:14:05 UTC [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Points.upsert_task-deprecated_k8s_features: Task: 'deprecated_k8s_features' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.009686195 [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:05] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:14:05] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:14:05] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:14:05] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:05] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rolling_update] [2025-06-19 23:14:05] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.Task.task_runner.rolling_update: Starting test [2025-06-19 23:14:05] DEBUG -- CNTI-rolling_update: container_names: [#] [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:14:05] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:14:05] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:14:05] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:14:05] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:14:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:14:05] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:14:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:14:05] DEBUG -- CNTI-rolling_update: container: {"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]} [2025-06-19 23:14:05] DEBUG -- CNTI-rolling_update: container_names: [#] [2025-06-19 23:14:05] DEBUG -- CNTI: config_container: # [2025-06-19 23:14:05] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-06-19 23:14:05] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:14:05] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns ✔️ PASSED: [rolling_update] CNF for Rolling Update Passed  [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_update' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_update' type: [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_update' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_update' type: [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.Points.upsert_task-rolling_update: Task start time: 2025-06-19 23:14:05 UTC, end time: 2025-06-19 23:14:26 UTC [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.Points.upsert_task-rolling_update: Task: 'rolling_update' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:20.821207179 [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:26] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:14:26] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:14:26] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:14:26] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:26] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rolling_downgrade] [2025-06-19 23:14:26] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.Task.task_runner.rolling_downgrade: Starting test [2025-06-19 23:14:26] DEBUG -- CNTI-rolling_downgrade: container_names: [#] [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:14:26] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:14:26] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:14:26] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:14:26] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:14:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:14:26] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:14:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:14:26] DEBUG -- CNTI-rolling_downgrade: container: {"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]} [2025-06-19 23:14:26] DEBUG -- CNTI-rolling_downgrade: container_names: [#] [2025-06-19 23:14:26] DEBUG -- CNTI: config_container: # [2025-06-19 23:14:26] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-06-19 23:14:26] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:14:26] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns ✔️ PASSED: [rolling_downgrade] CNF for Rolling Downgrade Passed  [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_downgrade' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_downgrade' type: [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_downgrade' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_downgrade' type: [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.Points.upsert_task-rolling_downgrade: Task start time: 2025-06-19 23:14:26 UTC, end time: 2025-06-19 23:14:46 UTC [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.Points.upsert_task-rolling_downgrade: Task: 'rolling_downgrade' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:20.800067685 [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:46] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:14:46] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:14:46] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:14:46] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:14:46] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rolling_version_change] [2025-06-19 23:14:46] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.Task.task_runner.rolling_version_change: Starting test [2025-06-19 23:14:46] DEBUG -- CNTI-rolling_version_change: container_names: [#] [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:14:46] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:14:46] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:14:46] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:14:46] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:14:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:14:47] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:14:47] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:14:47] DEBUG -- CNTI-rolling_version_change: container: {"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.6.7", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]} [2025-06-19 23:14:47] DEBUG -- CNTI-rolling_version_change: container_names: [#] [2025-06-19 23:14:47] DEBUG -- CNTI: config_container: # [2025-06-19 23:14:47] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-06-19 23:14:47] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:14:47] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns ✔️ PASSED: [rolling_version_change] CNF for Rolling Version Change Passed  Compatibility, installability, and upgradeability results: 9 of 10 tests passed  [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_version_change' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_version_change' type: [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_version_change' tags: ["compatibility", "dynamic", "workload"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_version_change' type: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.upsert_task-rolling_version_change: Task start time: 2025-06-19 23:14:46 UTC, end time: 2025-06-19 23:15:07 UTC [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.upsert_task-rolling_version_change: Task: 'rolling_version_change' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:20.830152871 [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tags: ["compatibility"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 140, total tasks passed: 9 for tags: ["compatibility"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: [] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: [] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cni_compatible -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_update -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_downgrade -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_version_change -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rollback -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: deprecated_k8s_features -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_deploy -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_valid -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_published -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 145, max tasks passed: 10 for tags: ["compatibility"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tags: ["compatibility"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 140, total tasks passed: 9 for tags: ["compatibility"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: [] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: [] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cni_compatible -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_update -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_downgrade -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_version_change -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rollback -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: deprecated_k8s_features -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_deploy -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_valid -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_published -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 145, max tasks passed: 10 for tags: ["compatibility"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 100, total tasks passed: 1 for tags: ["essential"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: [] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: [] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: selinux_options is worth: 100 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1900, max tasks passed: 19 for tags: ["essential"] [2025-06-19 23:15:07] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => nil, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}]} [2025-06-19 23:15:07] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}]} [2025-06-19 23:15:07] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}]} [2025-06-19 23:15:07] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}], "maximum_points" => 145} [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:07] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:15:07] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:15:07] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:15:07] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:07] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [no_local_volume_configuration] Rescued: On resource coredns-coredns of kind Service, local storage configuration volumes not found ✔️ ✨PASSED: [no_local_volume_configuration] local storage configuration volumes not found 🖥️ 💾 [2025-06-19 23:15:07] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Task.task_runner.no_local_volume_configuration: Starting test [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:15:07] DEBUG -- CNTI-no_local_volume_configuration: volumes: [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}] [2025-06-19 23:15:07] DEBUG -- CNTI-no_local_volume_configuration: persistent volume claim names: [] [2025-06-19 23:15:07] ERROR -- CNTI-no_local_volume_configuration: Missing hash key: "template" [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'no_local_volume_configuration' emoji: 💾 [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'no_local_volume_configuration' tags: ["state", "dynamic", "workload", "bonus"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points: Task: 'no_local_volume_configuration' type: bonus [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'no_local_volume_configuration' tags: ["state", "dynamic", "workload", "bonus"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points: Task: 'no_local_volume_configuration' type: bonus [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Points.upsert_task-no_local_volume_configuration: Task start time: 2025-06-19 23:15:07 UTC, end time: 2025-06-19 23:15:07 UTC [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Points.upsert_task-no_local_volume_configuration: Task: 'no_local_volume_configuration' has status: 'passed' and is awarded: 1 points.Runtime: 00:00:00.019705476 [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:07] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:15:07] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:15:07] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:15:07] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:07] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [elastic_volumes] [2025-06-19 23:15:07] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.Task.task_runner.elastic_volumes: Starting test [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:15:07] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:15:07] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:15:07] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:15:07] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:15:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:15:08] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:15:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:15:08] INFO -- CNTI-elastic_volumes:test_resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:15:08] INFO -- CNTI-elastic_volumes:volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-06-19 23:15:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✖️ ✨FAILED: [elastic_volumes] Some of the used volumes are not elastic 🧫 [2025-06-19 23:15:08] INFO -- CNTI: workloadresource elastic? [2025-06-19 23:15:08] INFO -- CNTI: vct_resource?? [2025-06-19 23:15:08] INFO -- CNTI: vct_resource? resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "6", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-06-19T23:12:57Z", "generation" => 8, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "1484683", "uid" => "5e801548-0539-4cbb-957f-338863f70d5e"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-06-19T23:13:40Z", "lastUpdateTime" => "2025-06-19T23:13:40Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}, {"lastTransitionTime" => "2025-06-19T23:12:57Z", "lastUpdateTime" => "2025-06-19T23:15:07Z", "message" => "ReplicaSet \"coredns-coredns-6d479cd5cd\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}], "observedGeneration" => 8, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} [2025-06-19 23:15:08] INFO -- CNTI: vct_resource? vct: [2025-06-19 23:15:08] INFO -- CNTI: Volume.elastic_by_volumes [2025-06-19 23:15:08] INFO -- CNTI: storage_class_by_volumes? [2025-06-19 23:15:08] INFO -- CNTI: storage_class_by_volumes? volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-06-19 23:15:08] INFO -- CNTI: volume_claims [] [2025-06-19 23:15:08] INFO -- CNTI: storage_class_names: [] [2025-06-19 23:15:08] INFO -- CNTI: StorageClass.elastic_by_storage_class [2025-06-19 23:15:08] INFO -- CNTI-elastic_volumes:storage_class_names: [] [2025-06-19 23:15:08] INFO -- CNTI-elastic_volumes:provisioners: [] [2025-06-19 23:15:08] INFO -- CNTI: Provisioners: [] [2025-06-19 23:15:08] INFO -- CNTI: elastic? false [2025-06-19 23:15:08] INFO -- CNTI: Volume.elastic_by_volumes elastic: false [2025-06-19 23:15:08] INFO -- CNTI: workloadresource elastic?: false [2025-06-19 23:15:08] INFO -- CNTI-elastic_volumes:elastic_result: false [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-06-19 23:15:08] INFO -- CNTI-elastic_volumes:result: Volumes used: true; Elastic?: false [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'elastic_volumes' emoji: 🧫 [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'elastic_volumes' tags: ["state", "dynamic", "workload", "bonus"] [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points: Task: 'elastic_volumes' type: bonus [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.Points.task_points: Task: elastic_volumes is worth: 0 points [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'elastic_volumes' tags: ["state", "dynamic", "workload", "bonus"] [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points: Task: 'elastic_volumes' type: bonus [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.upsert_task-elastic_volumes: Task start time: 2025-06-19 23:15:07 UTC, end time: 2025-06-19 23:15:08 UTC [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.Points.upsert_task-elastic_volumes: Task: 'elastic_volumes' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.309402487 [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:08] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:15:08] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:15:08] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:15:08] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:08] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [database_persistence] [2025-06-19 23:15:08] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.Task.task_runner.database_persistence: Starting test [2025-06-19 23:15:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ SKIPPED: [database_persistence] CNF does not use database 🧫 [2025-06-19 23:15:08] INFO -- CNTI: local_match_by_image_name image_name: mysql/mysql-server [2025-06-19 23:15:08] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:15:08] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:15:08] INFO -- CNTI: local_match_by_image_name image_name: bitnami/mysql [2025-06-19 23:15:08] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:15:08] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:15:08] INFO -- CNTI: database_persistence mysql: [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'database_persistence' emoji: 🧫 [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'database_persistence' tags: ["state", "dynamic", "workload"] [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points: Task: 'database_persistence' type: [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 0 points [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'database_persistence' tags: ["state", "dynamic", "workload"] [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points: Task: 'database_persistence' type: [2025-06-19 23:15:08] DEBUG -- CNTI-CNFManager.Points.upsert_task-database_persistence: Task start time: 2025-06-19 23:15:08 UTC, end time: 2025-06-19 23:15:08 UTC [2025-06-19 23:15:08] INFO -- CNTI-CNFManager.Points.upsert_task-database_persistence: Task: 'database_persistence' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.120747198 [2025-06-19 23:15:08] INFO -- CNTI: install litmus [2025-06-19 23:15:08] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: litmus [2025-06-19 23:15:08] INFO -- CNTI-Label.namespace: command: kubectl label namespace litmus pod-security.kubernetes.io/enforce=privileged [2025-06-19 23:15:08] DEBUG -- CNTI-Label.namespace: output: namespace/litmus labeled [2025-06-19 23:15:08] INFO -- CNTI: install litmus operator [2025-06-19 23:15:08] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file https://litmuschaos.github.io/litmus/litmus-operator-v3.6.0.yaml [2025-06-19 23:15:09] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: Warning: resource namespaces/litmus is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "chaos-operator" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "chaos-operator" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "chaos-operator" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "chaos-operator" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:15:09] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:09] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:15:09] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:09] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:09] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:15:09] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:15:09] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:15:09] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:15:09] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [node_drain] [2025-06-19 23:15:09] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:15:09] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:15:09] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:15:09] INFO -- CNTI-CNFManager.Task.task_runner.node_drain: Starting test [2025-06-19 23:15:09] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:15:09] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:15:09] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:15:09] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:15:09] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:15:09] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:15:09] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:15:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:15:09] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:15:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:15:09] INFO -- CNTI: Current Resource Name: Deployment/coredns-coredns Namespace: cnf-default [2025-06-19 23:15:09] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:15:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:15:10] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-06-19 23:15:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:15:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:15:11] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v131-worker, v131-worker2 [2025-06-19 23:15:11] INFO -- CNTI: Getting the operator node name: kubectl get pods -l app.kubernetes.io/instance=coredns -n cnf-default -o=jsonpath='{.items[0].spec.nodeName}' [2025-06-19 23:15:11] DEBUG -- CNTI: status_code: 0 [2025-06-19 23:15:11] INFO -- CNTI: Found node to cordon v131-worker2 using label app.kubernetes.io/instance='coredns' in cnf-default namespace. [2025-06-19 23:15:11] INFO -- CNTI-KubectlClient.Utils.cordon: Cordon node v131-worker2 [2025-06-19 23:15:11] INFO -- CNTI: Cordoned node v131-worker2 successfully. [2025-06-19 23:15:11] DEBUG -- CNTI-node_drain: Getting the app node name kubectl get pods -l app.kubernetes.io/instance=coredns -n cnf-default -o=jsonpath='{.items[0].spec.nodeName}' [2025-06-19 23:15:11] DEBUG -- CNTI-node_drain: status_code: 0 [2025-06-19 23:15:11] DEBUG -- CNTI-node_drain: Getting the app node name kubectl get pods -n litmus -l app.kubernetes.io/name=litmus -o=jsonpath='{.items[0].spec.nodeName}' [2025-06-19 23:15:11] DEBUG -- CNTI-node_drain: status_code: 0 [2025-06-19 23:15:11] INFO -- CNTI: Workload Node Name: v131-worker2 [2025-06-19 23:15:11] INFO -- CNTI: Litmus Node Name: v131-worker [2025-06-19 23:15:11] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/node-drain/fault.yaml, node_drain_experiment.yaml [2025-06-19 23:15:11] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:15:11] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_experiment.yaml [2025-06-19 23:15:11] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:15:11] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_experiment.yaml [2025-06-19 23:15:12] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/node-drain/rbac.yaml, node_drain_rbac.yaml [2025-06-19 23:15:12] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:15:12] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_rbac.yaml [2025-06-19 23:15:12] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:15:12] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_rbac.yaml [2025-06-19 23:15:12] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:15:12] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:15:12] INFO -- CNTI-node_drain: Chaos test name: coredns-coredns-7a84a5b9; Experiment name: node-drain; Label app.kubernetes.io/instance=coredns; namespace: cnf-default [2025-06-19 23:15:12] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/node-drain-chaosengine.yml [2025-06-19 23:15:12] INFO -- CNTI: wait_for_test: coredns-coredns-7a84a5b9-node-drain [2025-06-19 23:15:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:13] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:15] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:15:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:17] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:15:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:19] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:15:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:19] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:21] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:15:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:21] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:23] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:15:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:23] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:25] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:15:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:25] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:27] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:15:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:27] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:29] DEBUG -- CNTI: Time left: 1784 seconds [2025-06-19 23:15:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:30] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:32] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:15:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:32] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:34] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:15:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:34] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:36] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:15:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:36] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:38] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:15:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:38] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:40] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:15:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:40] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:42] DEBUG -- CNTI: Time left: 1771 seconds [2025-06-19 23:15:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:42] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:44] DEBUG -- CNTI: Time left: 1769 seconds [2025-06-19 23:15:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:44] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:46] DEBUG -- CNTI: Time left: 1767 seconds [2025-06-19 23:15:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:46] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:48] DEBUG -- CNTI: Time left: 1765 seconds [2025-06-19 23:15:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:49] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:51] DEBUG -- CNTI: Time left: 1762 seconds [2025-06-19 23:15:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:51] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:53] DEBUG -- CNTI: Time left: 1760 seconds [2025-06-19 23:15:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:53] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:55] DEBUG -- CNTI: Time left: 1758 seconds [2025-06-19 23:15:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:55] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:57] DEBUG -- CNTI: Time left: 1756 seconds [2025-06-19 23:15:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:57] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:15:59] DEBUG -- CNTI: Time left: 1754 seconds [2025-06-19 23:15:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:15:59] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:01] DEBUG -- CNTI: Time left: 1752 seconds [2025-06-19 23:16:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:01] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:03] DEBUG -- CNTI: Time left: 1750 seconds [2025-06-19 23:16:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:03] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:05] DEBUG -- CNTI: Time left: 1748 seconds [2025-06-19 23:16:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:06] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:08] DEBUG -- CNTI: Time left: 1745 seconds [2025-06-19 23:16:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:08] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:10] DEBUG -- CNTI: Time left: 1743 seconds [2025-06-19 23:16:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:10] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:12] DEBUG -- CNTI: Time left: 1741 seconds [2025-06-19 23:16:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:12] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:14] DEBUG -- CNTI: Time left: 1739 seconds [2025-06-19 23:16:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:14] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:16] DEBUG -- CNTI: Time left: 1737 seconds [2025-06-19 23:16:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:16] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:18] DEBUG -- CNTI: Time left: 1735 seconds [2025-06-19 23:16:18] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:18] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:20] DEBUG -- CNTI: Time left: 1733 seconds [2025-06-19 23:16:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:20] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:22] DEBUG -- CNTI: Time left: 1731 seconds [2025-06-19 23:16:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:22] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:24] DEBUG -- CNTI: Time left: 1729 seconds [2025-06-19 23:16:24] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:25] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:27] DEBUG -- CNTI: Time left: 1726 seconds [2025-06-19 23:16:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:27] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:29] DEBUG -- CNTI: Time left: 1724 seconds [2025-06-19 23:16:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:29] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:31] DEBUG -- CNTI: Time left: 1722 seconds [2025-06-19 23:16:31] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:31] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:33] DEBUG -- CNTI: Time left: 1720 seconds [2025-06-19 23:16:33] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:33] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:35] DEBUG -- CNTI: Time left: 1718 seconds [2025-06-19 23:16:35] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:35] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:37] DEBUG -- CNTI: Time left: 1716 seconds [2025-06-19 23:16:37] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:37] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:39] DEBUG -- CNTI: Time left: 1714 seconds [2025-06-19 23:16:39] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:39] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:41] DEBUG -- CNTI: Time left: 1712 seconds [2025-06-19 23:16:41] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:42] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:44] DEBUG -- CNTI: Time left: 1709 seconds [2025-06-19 23:16:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:44] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:46] DEBUG -- CNTI: Time left: 1707 seconds [2025-06-19 23:16:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:46] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:48] DEBUG -- CNTI: Time left: 1705 seconds [2025-06-19 23:16:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:48] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:50] DEBUG -- CNTI: Time left: 1703 seconds [2025-06-19 23:16:50] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:50] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:52] DEBUG -- CNTI: Time left: 1701 seconds [2025-06-19 23:16:52] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:52] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:54] DEBUG -- CNTI: Time left: 1699 seconds [2025-06-19 23:16:54] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:54] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:56] DEBUG -- CNTI: Time left: 1697 seconds [2025-06-19 23:16:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:56] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:16:58] DEBUG -- CNTI: Time left: 1695 seconds [2025-06-19 23:16:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:16:58] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:00] DEBUG -- CNTI: Time left: 1693 seconds [2025-06-19 23:17:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:01] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:03] DEBUG -- CNTI: Time left: 1690 seconds [2025-06-19 23:17:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:03] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:05] DEBUG -- CNTI: Time left: 1688 seconds [2025-06-19 23:17:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:05] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:07] DEBUG -- CNTI: Time left: 1686 seconds [2025-06-19 23:17:07] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:07] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:09] DEBUG -- CNTI: Time left: 1684 seconds [2025-06-19 23:17:09] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:09] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:11] DEBUG -- CNTI: Time left: 1682 seconds [2025-06-19 23:17:11] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:11] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:13] DEBUG -- CNTI: Time left: 1680 seconds [2025-06-19 23:17:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:13] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:15] DEBUG -- CNTI: Time left: 1678 seconds [2025-06-19 23:17:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:17] DEBUG -- CNTI: Time left: 1676 seconds [2025-06-19 23:17:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:19] DEBUG -- CNTI: Time left: 1673 seconds [2025-06-19 23:17:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:20] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:22] DEBUG -- CNTI: Time left: 1671 seconds [2025-06-19 23:17:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:22] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:24] DEBUG -- CNTI: Time left: 1669 seconds [2025-06-19 23:17:24] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:24] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:26] DEBUG -- CNTI: Time left: 1667 seconds [2025-06-19 23:17:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:26] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:17:28] DEBUG -- CNTI: Time left: 1665 seconds [2025-06-19 23:17:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7a84a5b9 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:17:28] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:17:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-7a84a5b9-node-drain -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:17:28] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:17:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-7a84a5b9-node-drain -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:17:28] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:17:28] INFO -- CNTI-KubectlClient.Utils.uncordon: Uncordon node v131-worker2 ✔️ 🏆PASSED: [node_drain] node_drain chaos test passed 🗡️💀♻ State results: 2 of 3 tests passed  [2025-06-19 23:17:28] INFO -- CNTI: Uncordoned node v131-worker2 successfully. [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'node_drain' emoji: 🗡️💀♻ [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'node_drain' tags: ["state", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points: Task: 'node_drain' type: essential [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'node_drain' tags: ["state", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points: Task: 'node_drain' type: essential [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.upsert_task-node_drain: Task start time: 2025-06-19 23:15:09 UTC, end time: 2025-06-19 23:17:28 UTC [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.upsert_task-node_drain: Task: 'node_drain' has status: 'passed' and is awarded: 100 points.Runtime: 00:02:19.223560524 [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tags: ["state"] [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 101, total tasks passed: 2 for tags: ["state"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: no_local_volume_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: elastic_volumes -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: database_persistence -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 5 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 106, max tasks passed: 3 for tags: ["state"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tags: ["state"] [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 101, total tasks passed: 2 for tags: ["state"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: no_local_volume_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: elastic_volumes -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: database_persistence -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 5 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 106, max tasks passed: 3 for tags: ["state"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 200, total tasks passed: 2 for tags: ["essential"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes"] [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:28] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:28] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: selinux_options is worth: 100 points [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:29] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:17:29] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1900, max tasks passed: 19 for tags: ["essential"] [2025-06-19 23:17:29] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:17:29] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:17:29] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:17:29] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 106} [2025-06-19 23:17:29] INFO -- CNTI-Setup.kubescape_framework_download: Downloading Kubescape testing framework [2025-06-19 23:17:29] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:17:29] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:17:29] DEBUG -- CNTI-Setup.kubescape_framework_download: Downloaded Kubescape framework json [2025-06-19 23:17:29] INFO -- CNTI-Setup.kubescape_framework_download: Kubescape framework json has been downloaded [2025-06-19 23:17:29] INFO -- CNTI-Setup.install_kubescape: Installing Kubescape tool [2025-06-19 23:17:29] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:17:29] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:17:32] DEBUG -- CNTI-Setup.install_kubescape: Downloaded Kubescape binary [2025-06-19 23:17:32] INFO -- CNTI-ShellCmd.run: command: chmod +x /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape [2025-06-19 23:17:32] DEBUG -- CNTI-ShellCmd.run: output: [2025-06-19 23:17:32] INFO -- CNTI-Setup.install_kubescape: Kubescape tool has been installed [2025-06-19 23:17:32] INFO -- CNTI-Setup.kubescape_scan: Perform Kubescape cluster scan [2025-06-19 23:17:32] INFO -- CNTI: scan command: /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape scan framework nsa --use-from /home/xtesting/.cnf-testsuite/tools/kubescape/nsa.json --output kubescape_results.json --format json --format-version=v1 --exclude-namespaces kube-system,kube-public,kube-node-lease,local-path-storage,litmus,cnf-testsuite [2025-06-19 23:17:38] INFO -- CNTI: output: ────────────────────────────────────────────────── Framework scanned: NSA ┌─────────────────┬────┐ │ Controls │ 25 │ │ Passed │ 11 │ │ Failed │ 9 │ │ Action Required │ 5 │ └─────────────────┴────┘ Failed resources by severity: ┌──────────┬────┐ │ Critical │ 0 │ │ High │ 0 │ │ Medium │ 11 │ │ Low │ 1 │ └──────────┴────┘ Run with '--verbose'/'-v' to see control failures for each resource. ┌──────────┬────────────────────────────────────────────────────┬──────────────────┬───────────────┬────────────────────┐ │ Severity │ Control name │ Failed resources │ All Resources │ Compliance score │ ├──────────┼────────────────────────────────────────────────────┼──────────────────┼───────────────┼────────────────────┤ │ Critical │ Disable anonymous access to Kubelet service │ 0 │ 0 │ Action Required ** │ │ Critical │ Enforce Kubelet client TLS authentication │ 0 │ 0 │ Action Required ** │ │ Medium │ Prevent containers from allowing command execution │ 2 │ 20 │ 90% │ │ Medium │ Non-root containers │ 1 │ 1 │ 0% │ │ Medium │ Allow privilege escalation │ 1 │ 1 │ 0% │ │ Medium │ Ingress and Egress blocked │ 1 │ 1 │ 0% │ │ Medium │ Automatic mapping of service account │ 3 │ 4 │ 25% │ │ Medium │ Administrative Roles │ 1 │ 20 │ 95% │ │ Medium │ Cluster internal networking │ 1 │ 2 │ 50% │ │ Medium │ Linux hardening │ 1 │ 1 │ 0% │ │ Medium │ Secret/etcd encryption enabled │ 0 │ 0 │ Action Required * │ │ Medium │ Audit logs enabled │ 0 │ 0 │ Action Required * │ │ Low │ Immutable container filesystem │ 1 │ 1 │ 0% │ │ Low │ PSP enabled │ 0 │ 0 │ Action Required * │ ├──────────┼────────────────────────────────────────────────────┼──────────────────┼───────────────┼────────────────────┤ │ │ Resource Summary │ 6 │ 30 │ 54.40% │ └──────────┴────────────────────────────────────────────────────┴──────────────────┴───────────────┴────────────────────┘ 🚨 * failed to get cloud provider, cluster: kind-v131 🚨 ** This control is scanned exclusively by the Kubescape operator, not the Kubescape CLI. Install the Kubescape operator: https://kubescape.io/docs/install-operator/. [2025-06-19 23:17:38] INFO -- CNTI: stderr: {"level":"info","ts":"2025-06-19T23:17:32Z","msg":"Kubescape scanner initializing..."} {"level":"warn","ts":"2025-06-19T23:17:33Z","msg":"Deprecated format version","run":"--format-version=v2"} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Initialized scanner"} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Loading policies..."} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Loaded policies"} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Loading exceptions..."} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Loaded exceptions"} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Loading account configurations..."} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Loaded account configurations"} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Accessing Kubernetes objects..."} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Accessed Kubernetes objects"} {"level":"info","ts":"2025-06-19T23:17:37Z","msg":"Scanning","Cluster":"kind-v131"} {"level":"info","ts":"2025-06-19T23:17:38Z","msg":"Done scanning","Cluster":"kind-v131"} {"level":"info","ts":"2025-06-19T23:17:38Z","msg":"Done aggregating results"} {"level":"info","ts":"2025-06-19T23:17:38Z","msg":"Scan results saved","filename":"kubescape_results.json"} Overall compliance-score (100- Excellent, 0- All failed): 54 {"level":"info","ts":"2025-06-19T23:17:38Z","msg":"Received interrupt signal, exiting..."} [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [symlink_file_system] ✔️ PASSED: [symlink_file_system] No containers allow a symlink attack 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.symlink_file_system: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'symlink_file_system' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'symlink_file_system' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'symlink_file_system' type: normal [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'symlink_file_system' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'symlink_file_system' type: normal [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-symlink_file_system: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-symlink_file_system: Task: 'symlink_file_system' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.042123506 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [privilege_escalation] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: If your application does not need it, make sure the allowPrivilegeEscalation field of the securityContext is set to false. ✖️ FAILED: [privilege_escalation] Found containers that allow privilege escalation 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.privilege_escalation: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'privilege_escalation' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privilege_escalation' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'privilege_escalation' type: normal [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 0 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privilege_escalation' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'privilege_escalation' type: normal [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-privilege_escalation: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-privilege_escalation: Task: 'privilege_escalation' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.028121501 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [insecure_capabilities] ✔️ PASSED: [insecure_capabilities] Containers with insecure capabilities were not found 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.insecure_capabilities: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'insecure_capabilities' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'insecure_capabilities' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'insecure_capabilities' type: normal [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'insecure_capabilities' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'insecure_capabilities' type: normal [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-insecure_capabilities: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-insecure_capabilities: Task: 'insecure_capabilities' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.024402472 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [memory_limits] ✔️ 🏆PASSED: [memory_limits] Containers have memory limits set 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.memory_limits: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'memory_limits' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'memory_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'memory_limits' type: essential [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'memory_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'memory_limits' type: essential [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-memory_limits: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-memory_limits: Task: 'memory_limits' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.022566996 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [cpu_limits] ✔️ 🏆PASSED: [cpu_limits] Containers have CPU limits set 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.cpu_limits: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'cpu_limits' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cpu_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'cpu_limits' type: essential [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cpu_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'cpu_limits' type: essential [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-cpu_limits: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-cpu_limits: Task: 'cpu_limits' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.022623215 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [linux_hardening] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: You can use AppArmor, Seccomp, SELinux and Linux Capabilities mechanisms to restrict containers abilities to utilize unwanted privileges. ✖️ ✨FAILED: [linux_hardening] Found resources that do not use security services 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.linux_hardening: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'linux_hardening' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'linux_hardening' tags: ["security", "dynamic", "workload", "bonus"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'linux_hardening' type: bonus [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: linux_hardening is worth: 0 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'linux_hardening' tags: ["security", "dynamic", "workload", "bonus"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'linux_hardening' type: bonus [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-linux_hardening: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-linux_hardening: Task: 'linux_hardening' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.022599148 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [ingress_egress_blocked] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: Define a network policy that restricts ingress and egress connections. ✖️ ✨FAILED: [ingress_egress_blocked] Ingress and Egress traffic not blocked on pods 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.ingress_egress_blocked: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'ingress_egress_blocked' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'ingress_egress_blocked' tags: ["security", "dynamic", "workload", "bonus"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'ingress_egress_blocked' type: bonus [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: ingress_egress_blocked is worth: 0 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'ingress_egress_blocked' tags: ["security", "dynamic", "workload", "bonus"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'ingress_egress_blocked' type: bonus [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-ingress_egress_blocked: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-ingress_egress_blocked: Task: 'ingress_egress_blocked' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.022522673 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [host_pid_ipc_privileges] ✔️ PASSED: [host_pid_ipc_privileges] No containers with hostPID and hostIPC privileges 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.host_pid_ipc_privileges: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'host_pid_ipc_privileges' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_pid_ipc_privileges' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'host_pid_ipc_privileges' type: normal [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_pid_ipc_privileges' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'host_pid_ipc_privileges' type: normal [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-host_pid_ipc_privileges: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-host_pid_ipc_privileges: Task: 'host_pid_ipc_privileges' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.024438607 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [non_root_containers] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: If your application does not need root privileges, make sure to define runAsNonRoot as true or explicitly set the runAsUser using ID 1000 or higher under the PodSecurityContext or container securityContext. In addition, set an explicit value for runAsGroup using ID 1000 or higher. ✖️ 🏆FAILED: [non_root_containers] Found containers running with root user or user with root group membership 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.non_root_containers: Starting test [2025-06-19 23:17:38] INFO -- CNTI: kubescape parse [2025-06-19 23:17:38] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'non_root_containers' emoji: 🔓🔑 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'non_root_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'non_root_containers' type: essential [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 0 points [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'non_root_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points: Task: 'non_root_containers' type: essential [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Points.upsert_task-non_root_containers: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:38 UTC [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Points.upsert_task-non_root_containers: Task: 'non_root_containers' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.024544134 [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:38] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:38] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [privileged_containers] [2025-06-19 23:17:38] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.Task.task_runner.privileged_containers: Starting test [2025-06-19 23:17:38] DEBUG -- CNTI: white_list_container_names [] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:38] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:38] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:38] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:17:38] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:17:38] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:38] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:17:38] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:38] DEBUG -- CNTI-KubectlClient.Get.privileged_containers: Get privileged containers [2025-06-19 23:17:38] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:17:39] INFO -- CNTI-KubectlClient.Get.privileged_containers: Found 8 privileged containers [2025-06-19 23:17:39] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:17:39] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✔️ 🏆PASSED: [privileged_containers] No privileged containers 🔓🔑 [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:17:39] DEBUG -- CNTI: violator list: [] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'privileged_containers' emoji: 🔓🔑 [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privileged_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points: Task: 'privileged_containers' type: essential [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privileged_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points: Task: 'privileged_containers' type: essential [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.upsert_task-privileged_containers: Task start time: 2025-06-19 23:17:38 UTC, end time: 2025-06-19 23:17:39 UTC [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Points.upsert_task-privileged_containers: Task: 'privileged_containers' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.596082235 [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:39] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:39] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:39] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:39] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:39] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [immutable_file_systems] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: Set the filesystem of the container to read-only when possible (pod securityContext, readOnlyRootFilesystem: true). If containers application needs to write into the filesystem, it is recommended to mount secondary filesystems for specific directories where application require write access. ✖️ ✨FAILED: [immutable_file_systems] Found containers with mutable file systems 🔓🔑 [2025-06-19 23:17:39] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Task.task_runner.immutable_file_systems: Starting test [2025-06-19 23:17:39] INFO -- CNTI: kubescape parse [2025-06-19 23:17:39] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:39] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'immutable_file_systems' emoji: 🔓🔑 [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_file_systems' tags: ["security", "dynamic", "workload", "bonus"] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_file_systems' type: bonus [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Points.task_points: Task: immutable_file_systems is worth: 0 points [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_file_systems' tags: ["security", "dynamic", "workload", "bonus"] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_file_systems' type: bonus [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Points.upsert_task-immutable_file_systems: Task start time: 2025-06-19 23:17:39 UTC, end time: 2025-06-19 23:17:39 UTC [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Points.upsert_task-immutable_file_systems: Task: 'immutable_file_systems' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.037139852 [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:39] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:39] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:39] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:39] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:39] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hostpath_mounts] [2025-06-19 23:17:39] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:39] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:39] INFO -- CNTI-CNFManager.Task.task_runner.hostpath_mounts: Starting test [2025-06-19 23:17:39] INFO -- CNTI: scan command: /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape scan control C-0048 --output kubescape_C-0048_results.json --format json --format-version=v1 --exclude-namespaces kube-system,kube-public,kube-node-lease,local-path-storage,litmus,cnf-testsuite ✔️ 🏆PASSED: [hostpath_mounts] Containers do not have hostPath mounts 🔓🔑 [2025-06-19 23:17:44] INFO -- CNTI: output: ────────────────────────────────────────────────── ┌─────────────────┬───┐ │ Controls │ 1 │ │ Passed │ 1 │ │ Failed │ 0 │ │ Action Required │ 0 │ └─────────────────┴───┘ Failed resources by severity: ┌──────────┬───┐ │ Critical │ 0 │ │ High │ 0 │ │ Medium │ 0 │ │ Low │ 0 │ └──────────┴───┘ Run with '--verbose'/'-v' to see control failures for each resource. ┌──────────┬──────────────────┬──────────────────┬───────────────┬──────────────────┐ │ Severity │ Control name │ Failed resources │ All Resources │ Compliance score │ ├──────────┼──────────────────┼──────────────────┼───────────────┼──────────────────┤ │ High │ HostPath mount │ 0 │ 1 │ 100% │ ├──────────┼──────────────────┼──────────────────┼───────────────┼──────────────────┤ │ │ Resource Summary │ 0 │ 1 │ 100.00% │ └──────────┴──────────────────┴──────────────────┴───────────────┴──────────────────┘ [2025-06-19 23:17:44] INFO -- CNTI: stderr: {"level":"info","ts":"2025-06-19T23:17:39Z","msg":"Kubescape scanner initializing..."} {"level":"warn","ts":"2025-06-19T23:17:40Z","msg":"Deprecated format version","run":"--format-version=v2"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Initialized scanner"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Loading policies..."} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Loaded policies"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Loading exceptions..."} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Loaded exceptions"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Loading account configurations..."} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Loaded account configurations"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Accessing Kubernetes objects..."} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Accessed Kubernetes objects"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Scanning","Cluster":"kind-v131"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Done scanning","Cluster":"kind-v131"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Done aggregating results"} {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Scan results saved","filename":"kubescape_C-0048_results.json"} Overall compliance-score (100- Excellent, 0- All failed): 100 {"level":"info","ts":"2025-06-19T23:17:44Z","msg":"Run with '--verbose'/'-v' flag for detailed resources view\n"} [2025-06-19 23:17:44] INFO -- CNTI: kubescape parse [2025-06-19 23:17:44] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:44] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'hostpath_mounts' emoji: 🔓🔑 [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostpath_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.Points: Task: 'hostpath_mounts' type: essential [2025-06-19 23:17:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostpath_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.Points: Task: 'hostpath_mounts' type: essential [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.Points.upsert_task-hostpath_mounts: Task start time: 2025-06-19 23:17:39 UTC, end time: 2025-06-19 23:17:44 UTC [2025-06-19 23:17:44] INFO -- CNTI-CNFManager.Points.upsert_task-hostpath_mounts: Task: 'hostpath_mounts' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:05.336221066 [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:44] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:44] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:44] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [container_sock_mounts] [2025-06-19 23:17:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:44] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:44] INFO -- CNTI-CNFManager.Task.task_runner.container_sock_mounts: Starting test [2025-06-19 23:17:44] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:17:45] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:17:46] INFO -- CNTI: TarClient.untar command: tar -xvf /tmp/kyvernoq2wwoek6.tar.gz -C /home/xtesting/.cnf-testsuite/tools [2025-06-19 23:17:46] INFO -- CNTI: TarClient.untar output: LICENSE kyverno [2025-06-19 23:17:46] INFO -- CNTI: TarClient.untar stderr: [2025-06-19 23:17:46] INFO -- CNTI: GitClient.clone command: --branch release-1.9 https://github.com/kyverno/policies.git /home/xtesting/.cnf-testsuite/tools/kyverno-policies [2025-06-19 23:17:48] INFO -- CNTI: GitClient.clone output: [2025-06-19 23:17:48] INFO -- CNTI: GitClient.clone stderr: Cloning into '/home/xtesting/.cnf-testsuite/tools/kyverno-policies'... [2025-06-19 23:17:48] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml [2025-06-19 23:17:48] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml [2025-06-19 23:17:48] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml --cluster --policy-report ✔️ 🏆PASSED: [container_sock_mounts] Container engine daemon sockets are not mounted as volumes 🔓🔑 [2025-06-19 23:17:50] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 3 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375070 summary: error: 0 fail: 0 pass: 84 skip: 168 warn: 0 [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'container_sock_mounts' emoji: 🔓🔑 [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'container_sock_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.Points: Task: 'container_sock_mounts' type: essential [2025-06-19 23:17:50] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'container_sock_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.Points: Task: 'container_sock_mounts' type: essential [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.Points.upsert_task-container_sock_mounts: Task start time: 2025-06-19 23:17:44 UTC, end time: 2025-06-19 23:17:50 UTC [2025-06-19 23:17:50] INFO -- CNTI-CNFManager.Points.upsert_task-container_sock_mounts: Task: 'container_sock_mounts' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:05.811863790 [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:50] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:50] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:50] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:50] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:50] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:50] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:50] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [external_ips] [2025-06-19 23:17:50] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:50] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:50] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:50] INFO -- CNTI-CNFManager.Task.task_runner.external_ips: Starting test [2025-06-19 23:17:50] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/restrict-service-external-ips/restrict-service-external-ips.yaml [2025-06-19 23:17:50] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/restrict-service-external-ips/restrict-service-external-ips.yaml [2025-06-19 23:17:50] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/restrict-service-external-ips/restrict-service-external-ips.yaml --cluster --policy-report ✔️ PASSED: [external_ips] Services are not using external IPs 🔓🔑 [2025-06-19 23:17:51] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 3 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'check-ips' passed. policy: restrict-external-ips resources: - apiVersion: v1 kind: Service name: kube-dns namespace: kube-system uid: 2f1d006e-4437-4d84-8f5a-fac73c051bb5 result: pass rule: check-ips scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375071 - message: validation rule 'check-ips' passed. policy: restrict-external-ips resources: - apiVersion: v1 kind: Service name: coredns-coredns namespace: cnf-default uid: e08610a7-b0a0-4344-96c0-e8844af6a2a9 result: pass rule: check-ips scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375071 - message: validation rule 'check-ips' passed. policy: restrict-external-ips resources: - apiVersion: v1 kind: Service name: kubernetes namespace: default uid: c762a022-3713-4bad-a765-0c9c3e3f8b1b result: pass rule: check-ips scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375071 summary: error: 0 fail: 0 pass: 3 skip: 0 warn: 0 [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:51] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'external_ips' emoji: 🔓🔑 [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'external_ips' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.Points: Task: 'external_ips' type: normal [2025-06-19 23:17:51] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'external_ips' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.Points: Task: 'external_ips' type: normal [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.Points.upsert_task-external_ips: Task start time: 2025-06-19 23:17:50 UTC, end time: 2025-06-19 23:17:51 UTC [2025-06-19 23:17:51] INFO -- CNTI-CNFManager.Points.upsert_task-external_ips: Task: 'external_ips' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.849581285 [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:51] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:51] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:51] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [selinux_options] [2025-06-19 23:17:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:51] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:51] INFO -- CNTI-CNFManager.Task.task_runner.selinux_options: Starting test [2025-06-19 23:17:51] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml [2025-06-19 23:17:51] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml [2025-06-19 23:17:51] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml --cluster --policy-report [2025-06-19 23:17:53] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375073 summary: error: 0 fail: 0 pass: 28 skip: 56 warn: 0 [2025-06-19 23:17:53] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml [2025-06-19 23:17:53] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml [2025-06-19 23:17:53] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml --cluster --policy-report ⏭️ 🏆N/A: [selinux_options] Pods are not using SELinux 🔓🔑 [2025-06-19 23:17:55] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375075 summary: error: 0 fail: 0 pass: 56 skip: 112 warn: 0 [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:56] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'selinux_options' emoji: 🔓🔑 [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'selinux_options' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.Points: Task: 'selinux_options' type: essential [2025-06-19 23:17:56] INFO -- CNTI-CNFManager.Points.task_points: Task: selinux_options is worth: 0 points [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'selinux_options' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.Points: Task: 'selinux_options' type: essential [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.Points.upsert_task-selinux_options: Task start time: 2025-06-19 23:17:51 UTC, end time: 2025-06-19 23:17:56 UTC [2025-06-19 23:17:56] INFO -- CNTI-CNFManager.Points.upsert_task-selinux_options: Task: 'selinux_options' has status: 'na' and is awarded: 0 points.Runtime: 00:00:04.569256599 [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:56] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:56] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:56] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [sysctls] [2025-06-19 23:17:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:56] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:56] INFO -- CNTI-CNFManager.Task.task_runner.sysctls: Starting test [2025-06-19 23:17:56] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/restrict-sysctls/restrict-sysctls.yaml [2025-06-19 23:17:56] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/restrict-sysctls/restrict-sysctls.yaml [2025-06-19 23:17:56] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/restrict-sysctls/restrict-sysctls.yaml --cluster --policy-report ✔️ PASSED: [sysctls] No restricted values found for sysctls 🔓🔑 [2025-06-19 23:17:57] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375077 summary: error: 0 fail: 0 pass: 28 skip: 56 warn: 0 [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'sysctls' emoji: 🔓🔑 [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sysctls' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points: Task: 'sysctls' type: normal [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sysctls' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points: Task: 'sysctls' type: normal [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.upsert_task-sysctls: Task start time: 2025-06-19 23:17:56 UTC, end time: 2025-06-19 23:17:57 UTC [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.Points.upsert_task-sysctls: Task: 'sysctls' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:01.863125640 [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:57] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:57] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:57] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:57] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:57] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [host_network] ✔️ PASSED: [host_network] No host network attached to pod 🔓🔑 [2025-06-19 23:17:57] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.Task.task_runner.host_network: Starting test [2025-06-19 23:17:57] INFO -- CNTI: kubescape parse [2025-06-19 23:17:57] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:57] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'host_network' emoji: 🔓🔑 [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_network' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points: Task: 'host_network' type: normal [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_network' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points: Task: 'host_network' type: normal [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.Points.upsert_task-host_network: Task start time: 2025-06-19 23:17:57 UTC, end time: 2025-06-19 23:17:57 UTC [2025-06-19 23:17:57] INFO -- CNTI-CNFManager.Points.upsert_task-host_network: Task: 'host_network' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.031261351 [2025-06-19 23:17:57] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:57] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [service_account_mapping] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: Disable automatic mounting of service account tokens to pods either at the service account level or at the individual pod level, by specifying the automountServiceAccountToken: false. Note that pod level takes precedence. ✖️ FAILED: [service_account_mapping] Service accounts automatically mapped 🔓🔑 [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.task_runner.service_account_mapping: Starting test [2025-06-19 23:17:58] INFO -- CNTI: kubescape parse [2025-06-19 23:17:58] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'service_account_mapping' emoji: 🔓🔑 [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_account_mapping' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points: Task: 'service_account_mapping' type: normal [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 0 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_account_mapping' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points: Task: 'service_account_mapping' type: normal [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.upsert_task-service_account_mapping: Task start time: 2025-06-19 23:17:58 UTC, end time: 2025-06-19 23:17:58 UTC [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.upsert_task-service_account_mapping: Task: 'service_account_mapping' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.024802639 [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [application_credentials] ✔️ PASSED: [application_credentials] No applications credentials in configuration files 🔓🔑 Security results: 12 of 15 tests passed  [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.task_runner.application_credentials: Starting test [2025-06-19 23:17:58] INFO -- CNTI: kubescape parse [2025-06-19 23:17:58] INFO -- CNTI: kubescape test_by_test_name [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'application_credentials' emoji: 🔓🔑 [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'application_credentials' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points: Task: 'application_credentials' type: normal [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'application_credentials' tags: ["security", "dynamic", "workload", "normal"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points: Task: 'application_credentials' type: normal [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.upsert_task-application_credentials: Task start time: 2025-06-19 23:17:58 UTC, end time: 2025-06-19 23:17:58 UTC [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.upsert_task-application_credentials: Task: 'application_credentials' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.024390988 [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tags: ["security"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 535, total tasks passed: 12 for tags: ["security"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privilege_escalation -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: symlink_file_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: application_credentials -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_network -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_account_mapping -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_pid_ipc_privileges -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: linux_hardening -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_file_systems -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ingress_egress_blocked -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: insecure_capabilities -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sysctls -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: external_ips -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 645, max tasks passed: 15 for tags: ["security"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tags: ["security"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 535, total tasks passed: 12 for tags: ["security"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privilege_escalation -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: symlink_file_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: application_credentials -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_network -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_account_mapping -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_pid_ipc_privileges -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: linux_hardening -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_file_systems -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ingress_egress_blocked -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: insecure_capabilities -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sysctls -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: external_ips -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 645, max tasks passed: 15 for tags: ["security"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 700, total tasks passed: 7 for tags: ["essential"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-06-19 23:17:58] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}]} [2025-06-19 23:17:58] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}]} [2025-06-19 23:17:58] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}]} [2025-06-19 23:17:58] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}], "maximum_points" => 645} [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [nodeport_not_used] [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.task_runner.nodeport_not_used: Starting test [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:58] INFO -- CNTI-nodeport_not_used: nodeport_not_used resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:17:58] INFO -- CNTI-nodeport_not_used: nodeport_not_used resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:58] INFO -- CNTI-nodeport_not_used: resource kind: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Service/coredns-coredns ✔️ PASSED: [nodeport_not_used] NodePort is not used  [2025-06-19 23:17:58] DEBUG -- CNTI-nodeport_not_used: service: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "1484192", "uid" => "e08610a7-b0a0-4344-96c0-e8844af6a2a9"}, "spec" => {"clusterIP" => "10.96.180.214", "clusterIPs" => ["10.96.180.214"], "internalTrafficPolicy" => "Cluster", "ipFamilies" => ["IPv4"], "ipFamilyPolicy" => "SingleStack", "ports" => [{"name" => "udp-53", "port" => 53, "protocol" => "UDP", "targetPort" => 53}, {"name" => "tcp-53", "port" => 53, "protocol" => "TCP", "targetPort" => 53}], "selector" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}, "sessionAffinity" => "None", "type" => "ClusterIP"}, "status" => {"loadBalancer" => {}}} [2025-06-19 23:17:58] INFO -- CNTI-nodeport_not_used: service_type: ClusterIP [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'nodeport_not_used' tags: ["configuration", "dynamic", "workload", "normal"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points: Task: 'nodeport_not_used' type: normal [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'nodeport_not_used' tags: ["configuration", "dynamic", "workload", "normal"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points: Task: 'nodeport_not_used' type: normal [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Points.upsert_task-nodeport_not_used: Task start time: 2025-06-19 23:17:58 UTC, end time: 2025-06-19 23:17:58 UTC [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Points.upsert_task-nodeport_not_used: Task: 'nodeport_not_used' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.365146043 [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:58] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hostport_not_used] [2025-06-19 23:17:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.Task.task_runner.hostport_not_used: Starting test [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:58] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:58] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:58] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:17:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:59] INFO -- CNTI-hostport_not_used: hostport_not_used resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:59] INFO -- CNTI-hostport_not_used: resource kind: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "6", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-06-19T23:12:57Z", "generation" => 9, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "1484882", "uid" => "5e801548-0539-4cbb-957f-338863f70d5e"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-06-19T23:13:40Z", "lastUpdateTime" => "2025-06-19T23:13:40Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}, {"lastTransitionTime" => "2025-06-19T23:12:57Z", "lastUpdateTime" => "2025-06-19T23:15:07Z", "message" => "ReplicaSet \"coredns-coredns-6d479cd5cd\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}], "observedGeneration" => 9, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: single_port: {"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"} [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: DAS hostPort: [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: single_port: {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"} [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: DAS hostPort: [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:17:59] INFO -- CNTI-hostport_not_used: hostport_not_used resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:59] INFO -- CNTI-hostport_not_used: resource kind: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Service/coredns-coredns ✔️ 🏆PASSED: [hostport_not_used] HostPort is not used  [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: resource: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "1484192", "uid" => "e08610a7-b0a0-4344-96c0-e8844af6a2a9"}, "spec" => {"clusterIP" => "10.96.180.214", "clusterIPs" => ["10.96.180.214"], "internalTrafficPolicy" => "Cluster", "ipFamilies" => ["IPv4"], "ipFamilyPolicy" => "SingleStack", "ports" => [{"name" => "udp-53", "port" => 53, "protocol" => "UDP", "targetPort" => 53}, {"name" => "tcp-53", "port" => 53, "protocol" => "TCP", "targetPort" => 53}], "selector" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}, "sessionAffinity" => "None", "type" => "ClusterIP"}, "status" => {"loadBalancer" => {}}} [2025-06-19 23:17:59] DEBUG -- CNTI-hostport_not_used: containers: [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostport_not_used' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points: Task: 'hostport_not_used' type: essential [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostport_not_used' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points: Task: 'hostport_not_used' type: essential [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.upsert_task-hostport_not_used: Task start time: 2025-06-19 23:17:58 UTC, end time: 2025-06-19 23:17:59 UTC [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Points.upsert_task-hostport_not_used: Task: 'hostport_not_used' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.498336067 [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:59] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:59] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:59] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:59] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:59] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hardcoded_ip_addresses_in_k8s_runtime_configuration] [2025-06-19 23:17:59] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Task.task_runner.hardcoded_ip_addresses_in_k8s_runtime_configuration: Starting test [2025-06-19 23:17:59] DEBUG -- CNTI: Helm Path: helm [2025-06-19 23:17:59] INFO -- CNTI-KubectlClient.Delete.resource: Delete resource namespace/hardcoded-ip-test ✔️ 🏆PASSED: [hardcoded_ip_addresses_in_k8s_runtime_configuration] No hard-coded IP addresses found in the runtime K8s configuration  [2025-06-19 23:17:59] WARN -- CNTI-KubectlClient.Delete.resource.cmd: stderr: Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. Error from server (NotFound): namespaces "hardcoded-ip-test" not found [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' type: essential [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' type: essential [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.upsert_task-hardcoded_ip_addresses_in_k8s_runtime_configuration: Task start time: 2025-06-19 23:17:59 UTC, end time: 2025-06-19 23:17:59 UTC [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Points.upsert_task-hardcoded_ip_addresses_in_k8s_runtime_configuration: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.116001877 [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:59] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:59] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:59] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:59] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:59] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [secrets_used] [2025-06-19 23:17:59] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Task.task_runner.secrets_used: Starting test [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:17:59] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:17:59] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:17:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:59] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:17:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:17:59] INFO -- CNTI-secrets_used: resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:17:59] INFO -- CNTI-secrets_used: volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-06-19 23:17:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource secrets No Secret Volumes or Container secretKeyRefs found for resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} Secrets not used. To address this issue please see the USAGE.md documentation ⏭️ ✨SKIPPED: [secrets_used] Secrets not used 🧫 [2025-06-19 23:17:59] DEBUG -- CNTI-secrets_used: secret name: sh.helm.release.v1.coredns.v1, type: helm.sh/release.v1, namespace: cnf-default [2025-06-19 23:17:59] DEBUG -- CNTI-secrets_used: container: coredns envs [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'secrets_used' emoji: 🧫 [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'secrets_used' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points: Task: 'secrets_used' type: bonus [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Points.task_points: Task: secrets_used is worth: 0 points [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'secrets_used' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points: Task: 'secrets_used' type: bonus [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Points.upsert_task-secrets_used: Task start time: 2025-06-19 23:17:59 UTC, end time: 2025-06-19 23:17:59 UTC [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Points.upsert_task-secrets_used: Task: 'secrets_used' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.330783503 [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:59] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:17:59] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:17:59] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:17:59] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:17:59] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [immutable_configmap] [2025-06-19 23:17:59] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:17:59] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:17:59] INFO -- CNTI-CNFManager.Task.task_runner.immutable_configmap: Starting test [2025-06-19 23:17:59] DEBUG -- CNTI-immutable_configmap: test immutable_configmap template: apiVersion: v1 kind: ConfigMap metadata: name: myapp immutable: true data: api.server: doesnt_matter [2025-06-19 23:17:59] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/test_config_map.yml [2025-06-19 23:18:00] DEBUG -- CNTI-immutable_configmap: test immutable_configmap change template: apiVersion: v1 kind: ConfigMap metadata: name: myapp immutable: true data: api.server: doesnt_matter_again [2025-06-19 23:18:00] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/test_config_map.yml [2025-06-19 23:18:00] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: The ConfigMap "myapp" is invalid: data: Forbidden: field is immutable when `immutable` is set [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: immutable configmaps supported, continuing with test [2025-06-19 23:18:00] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:18:00] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:18:00] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:18:00] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:18:00] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:18:00] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:18:00] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:18:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:00] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:18:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-06-19 23:18:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmaps [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: Resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}; Volume count: 1 [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: Volume count for configmaps: 1 [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: Will loop through configmap volumes [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap:volume_item: {"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"} [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap:configmap_item: {"apiVersion" => "v1", "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}, "kind" => "ConfigMap", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "1484188", "uid" => "25ba4dc4-d84d-43dc-8578-de9fe83f6814"}} [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap_fail_volume: {"apiVersion" => "v1", "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}, "kind" => "ConfigMap", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "1484188", "uid" => "25ba4dc4-d84d-43dc-8578-de9fe83f6814"}} [2025-06-19 23:18:00] INFO -- CNTI-container_volume_mounts: [{"mountPath" => "/etc/coredns", "name" => "config-volume"}] [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap_volumes: [{resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, container: "coredns", volume: "config-volume", configmap: "coredns-coredns"}] [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap_envs: [] [2025-06-19 23:18:00] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:18:00] INFO -- CNTI-immutable_configmap: volumes: [{}] [2025-06-19 23:18:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmaps ✖️ ✨FAILED: [immutable_configmap] Found mutable configmap(s) ⚖️ [2025-06-19 23:18:01] INFO -- CNTI-immutable_configmap: Resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}; Volume count: 1 [2025-06-19 23:18:01] INFO -- CNTI-immutable_configmap: Volume count for configmaps: 1 [2025-06-19 23:18:01] INFO -- CNTI-immutable_configmap: Will loop through configmap volumes [2025-06-19 23:18:01] INFO -- CNTI-immutable_configmap_volumes: [] [2025-06-19 23:18:01] INFO -- CNTI-immutable_configmap_envs: [] [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'immutable_configmap' emoji: ⚖️ [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_configmap' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_configmap' type: bonus [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Points.task_points: Task: immutable_configmap is worth: 0 points [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_configmap' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_configmap' type: bonus [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.upsert_task-immutable_configmap: Task start time: 2025-06-19 23:17:59 UTC, end time: 2025-06-19 23:18:01 UTC [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Points.upsert_task-immutable_configmap: Task: 'immutable_configmap' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:01.269865381 [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:01] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:01] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:01] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:01] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:01] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [alpha_k8s_apis] ⏭️ SKIPPED: [alpha_k8s_apis] alpha_k8s_apis not in poc mode ⭕🔍 [2025-06-19 23:18:01] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Task.task_runner.alpha_k8s_apis: Starting test [2025-06-19 23:18:01] INFO -- CNTI: args.raw [] [2025-06-19 23:18:01] INFO -- CNTI: args.raw [] [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'alpha_k8s_apis' emoji: ⭕🔍 [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'alpha_k8s_apis' tags: ["configuration", "dynamic", "workload"] [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points: Task: 'alpha_k8s_apis' type: [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 0 points [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'alpha_k8s_apis' tags: ["configuration", "dynamic", "workload"] [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points: Task: 'alpha_k8s_apis' type: [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Points.upsert_task-alpha_k8s_apis: Task start time: 2025-06-19 23:18:01 UTC, end time: 2025-06-19 23:18:01 UTC [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Points.upsert_task-alpha_k8s_apis: Task: 'alpha_k8s_apis' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.017297352 [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:01] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:01] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:01] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:01] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:01] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [require_labels] [2025-06-19 23:18:01] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:01] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:01] INFO -- CNTI-CNFManager.Task.task_runner.require_labels: Starting test [2025-06-19 23:18:01] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/require_labels/require_labels.yaml [2025-06-19 23:18:01] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/require_labels/require_labels.yaml [2025-06-19 23:18:01] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/require_labels/require_labels.yaml --cluster --policy-report ✔️ PASSED: [require_labels] Pods have the app.kubernetes.io/name label 🏷️ [2025-06-19 23:18:02] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: validation rule 'autogen-check-for-labels' passed. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: validation rule 'check-for-labels' passed. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: validation rule 'autogen-check-for-labels' passed. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: validation rule 'check-for-labels' passed. policy: require-labels resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375082 summary: error: 0 fail: 24 pass: 4 skip: 56 warn: 0 [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:02] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'require_labels' emoji: 🏷️ [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'require_labels' tags: ["configuration", "dynamic", "workload", "normal"] [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.Points: Task: 'require_labels' type: normal [2025-06-19 23:18:02] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'require_labels' tags: ["configuration", "dynamic", "workload", "normal"] [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.Points: Task: 'require_labels' type: normal [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.Points.upsert_task-require_labels: Task start time: 2025-06-19 23:18:01 UTC, end time: 2025-06-19 23:18:02 UTC [2025-06-19 23:18:02] INFO -- CNTI-CNFManager.Points.upsert_task-require_labels: Task: 'require_labels' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:01.765022171 [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:02] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:02] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:02] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:02] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:02] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:02] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:02] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [latest_tag] [2025-06-19 23:18:02] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:02] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:02] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:02] INFO -- CNTI-CNFManager.Task.task_runner.latest_tag: Starting test [2025-06-19 23:18:02] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml [2025-06-19 23:18:02] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml [2025-06-19 23:18:02] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml --cluster --policy-report ✔️ 🏆PASSED: [latest_tag] Container images are not using the latest tag 🏷️ [2025-06-19 23:18:04] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375084 summary: error: 0 fail: 0 pass: 56 skip: 112 warn: 0 [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:04] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'latest_tag' emoji: 🏷️ [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'latest_tag' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.Points: Task: 'latest_tag' type: essential [2025-06-19 23:18:04] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'latest_tag' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.Points: Task: 'latest_tag' type: essential [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.Points.upsert_task-latest_tag: Task start time: 2025-06-19 23:18:02 UTC, end time: 2025-06-19 23:18:04 UTC [2025-06-19 23:18:04] INFO -- CNTI-CNFManager.Points.upsert_task-latest_tag: Task: 'latest_tag' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:01.945474017 [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:04] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:04] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:04] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:04] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:04] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:04] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:04] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [default_namespace] [2025-06-19 23:18:04] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:04] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:04] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:04] INFO -- CNTI-CNFManager.Task.task_runner.default_namespace: Starting test [2025-06-19 23:18:04] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_default_namespace/disallow_default_namespace.yaml [2025-06-19 23:18:04] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_default_namespace/disallow_default_namespace.yaml [2025-06-19 23:18:04] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_default_namespace/disallow_default_namespace.yaml --cluster --policy-report ✔️ PASSED: [default_namespace] default namespace is not being used 🏷️ [2025-06-19 23:18:06] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-crvg8 namespace: cnf-testsuite uid: 90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-n9lh4 namespace: cnf-testsuite uid: de1da172-4054-4a52-a719-d1d625a68358 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 1ff9bc6f-7bce-4860-838c-ae5bd13590ee result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 7144563b-7ec8-4a48-af8a-124e407d4e38 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-586f75ccbc-rcqjh namespace: litmus uid: 758273c5-9708-47fd-87a2-3fef8035e575 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-coredns-6d479cd5cd-vfv4q namespace: cnf-default uid: 939e29f4-e4ac-4983-b04a-1f956bc46939 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 5e801548-0539-4cbb-957f-338863f70d5e result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-5cb96f8fdd-764fw namespace: local-path-storage uid: 05523bae-4efa-4c4b-9a03-c582f83c184b result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 009d86bf-1ac2-4d3c-a5d2-0e703d48e5f1 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-sjps8 namespace: kube-system uid: 7519c1e3-1db0-4d8e-b6c7-cede82ca1de4 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v131-control-plane namespace: kube-system uid: 3f927471-e090-4306-8d16-beeadb56c074 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: c2eac70f-d513-4998-a1db-54e9ea0a004e result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: d7a3c10a-b7d8-4784-906e-1c33ca050c7c result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-n85ww namespace: kube-system uid: 80939e37-82e4-43bc-bf2a-10d970877f1f result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: etcd-v131-control-plane namespace: kube-system uid: 712de20a-7c48-49c0-bf36-708c28fcaec5 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-f9g2x namespace: kube-system uid: 1cce1f8e-6728-426d-bfb2-6c7f097c8e7b result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-h9krb namespace: kube-system uid: 3a56a8ec-3e34-4309-ba90-6245482b6f1f result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: e0bbab1f-c75f-4ddf-81b6-ea06db85dae5 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-gj76m namespace: kube-system uid: 74f85062-9b41-4704-abc0-f4224a00b81b result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-p2hcc namespace: kube-system uid: 300b6a06-1003-4238-a281-72a70413b29b result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v131-control-plane namespace: kube-system uid: 344a611e-cc08-41e1-b0fe-5a6958d80fc6 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-7c65d6cfc9-hlg4b namespace: kube-system uid: 851c55e0-7046-4fd5-b636-fb38ffa5692e result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-6fc9z namespace: kube-system uid: 52c42ac4-f9f2-4126-872c-99105ee224ef result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-cplll namespace: kube-system uid: 1482c471-60d0-43a8-acea-fadbdfcc27dc result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-n4mpn namespace: kube-system uid: d43e01df-9434-46e0-8c5f-612f1048a06d result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-htvqt namespace: kube-system uid: 7ec89f98-9006-4a88-a5cb-baa490ebec45 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v131-control-plane namespace: kube-system uid: d1edeefc-17cb-42e7-8718-bf5eef097e79 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 230fa49c-dc52-45e4-bda2-2e8aa45d88a8 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1750375086 summary: error: 0 fail: 0 pass: 28 skip: 28 warn: 0 [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:06] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'default_namespace' emoji: 🏷️ [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'default_namespace' tags: ["configuration", "dynamic", "workload", "normal"] [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points: Task: 'default_namespace' type: normal [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'default_namespace' tags: ["configuration", "dynamic", "workload", "normal"] [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points: Task: 'default_namespace' type: normal [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.upsert_task-default_namespace: Task start time: 2025-06-19 23:18:04 UTC, end time: 2025-06-19 23:18:06 UTC [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.Points.upsert_task-default_namespace: Task: 'default_namespace' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:01.733326689 [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:06] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:06] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:06] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:06] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:06] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [operator_installed] ⏭️ ✨N/A: [operator_installed] No Operators Found 🦖 ⚖️👀 KUBECONFIG is set as /home/xtesting/.kube/config. [2025-06-19 23:18:06] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.Task.task_runner.operator_installed: Starting test [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.cnf_resources: Map block to CNF resources [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:18:06] INFO -- CNTI-operator_installed: Subscription Names: [] [2025-06-19 23:18:06] INFO -- CNTI-operator_installed: CSV Names: [] [2025-06-19 23:18:06] INFO -- CNTI-operator_installed: Succeeded CSV Names: [] [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'operator_installed' emoji: ⚖️👀 [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'operator_installed' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points: Task: 'operator_installed' type: bonus [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.Points.task_points: Task: operator_installed is worth: 0 points [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'operator_installed' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points: Task: 'operator_installed' type: bonus [2025-06-19 23:18:06] DEBUG -- CNTI-CNFManager.Points.upsert_task-operator_installed: Task start time: 2025-06-19 23:18:06 UTC, end time: 2025-06-19 23:18:06 UTC [2025-06-19 23:18:06] INFO -- CNTI-CNFManager.Points.upsert_task-operator_installed: Task: 'operator_installed' has status: 'na' and is awarded: 0 points.Runtime: 00:00:00.014374686 [2025-06-19 23:18:06] INFO -- CNTI-Setup.create_namespace: Creating namespace for CNTI testsuite [2025-06-19 23:18:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:18:06] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-testsuite cnf-testsuite namespace already exists on the Kubernetes cluster [2025-06-19 23:18:06] WARN -- CNTI-KubectlClient.Apply.namespace.cmd: stderr: Error from server (AlreadyExists): namespaces "cnf-testsuite" already exists [2025-06-19 23:18:06] INFO -- CNTI-Setup.create_namespace: cnf-testsuite namespace already exists, not creating [2025-06-19 23:18:06] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-testsuite with pod-security.kubernetes.io/enforce=privileged [2025-06-19 23:18:07] INFO -- CNTI-KubectlClient.server_version: K8s server version is: 1.31.9 [2025-06-19 23:18:07] DEBUG -- CNTI: version_less_than: 1.31.9 < 1.25.0: false [2025-06-19 23:18:07] INFO -- CNTI-Helm.helm_repo_add: Adding helm repository: gatekeeper [2025-06-19 23:18:07] DEBUG -- CNTI-Helm.helm_repo_add.cmd: command: helm repo add gatekeeper https://open-policy-agent.github.io/gatekeeper/charts [2025-06-19 23:18:07] INFO -- CNTI-Helm.install: Installing helm chart: gatekeeper/gatekeeper [2025-06-19 23:18:07] DEBUG -- CNTI-Helm.install: Values: --set auditInterval=1 --set postInstall.labelNamespace.enabled=false -n cnf-testsuite --set psp.enabled=false [2025-06-19 23:18:07] DEBUG -- CNTI-Helm.install.cmd: command: helm install opa-gatekeeper --set auditInterval=1 --set postInstall.labelNamespace.enabled=false -n cnf-testsuite --set psp.enabled=false gatekeeper/gatekeeper --set auditInterval=1 --set postInstall.labelNamespace.enabled=false -n cnf-testsuite --set psp.enabled=false [2025-06-19 23:18:41] INFO -- CNTI-KubectlClient.wait.wait_for_install_by_apply: Waiting for manifest found in constraint_template.yml to install [2025-06-19 23:18:41] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file constraint_template.yml [2025-06-19 23:18:41] INFO -- CNTI-KubectlClient.wait.wait_for_install_by_apply: seconds elapsed while waiting: 0 [2025-06-19 23:18:42] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file constraint_template.yml [2025-06-19 23:18:42] INFO -- CNTI-KubectlClient.wait.wait_for_install_by_apply: Manifest constraint_template.yml is installed [2025-06-19 23:18:42] INFO -- CNTI-KubectlClient.wait.wait_for_condition: Wait for condition condition=established in crd/requiretags.constraints.gatekeeper.sh [2025-06-19 23:18:43] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file enforce-image-tag.yml [2025-06-19 23:18:43] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:43] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:43] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:43] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:43] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:43] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:43] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [versioned_tag] [2025-06-19 23:18:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:43] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:43] INFO -- CNTI-CNFManager.Task.task_runner.versioned_tag: Starting test [2025-06-19 23:18:43] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:18:43] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:18:43] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:18:43] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:18:43] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:18:43] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:18:43] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:18:43] INFO -- CNTI: OPA.find_non_versioned_pod: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:18:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource requiretags/block-latest-tag ✔️ PASSED: [versioned_tag] Container images use versioned tags 🏷️ Configuration results: 7 of 9 tests passed  [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'versioned_tag' emoji: 🏷️ [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'versioned_tag' tags: ["configuration", "dynamic", "workload"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points: Task: 'versioned_tag' type: [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'versioned_tag' tags: ["configuration", "dynamic", "workload"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points: Task: 'versioned_tag' type: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.upsert_task-versioned_tag: Task start time: 2025-06-19 23:18:43 UTC, end time: 2025-06-19 23:18:44 UTC [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.upsert_task-versioned_tag: Task: 'versioned_tag' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.734006866 [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tags: ["configuration"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 320, total tasks passed: 7 for tags: ["configuration"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: versioned_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ip_addresses -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: ip_addresses is worth: 0 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: operator_installed -> failed: false, skipped: NA: false, bonus: {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0} [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: nodeport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: secrets_used -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_configmap -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: alpha_k8s_apis -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: require_labels -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: default_namespace -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 325, max tasks passed: 9 for tags: ["configuration"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tags: ["configuration"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 320, total tasks passed: 7 for tags: ["configuration"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: versioned_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ip_addresses -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: ip_addresses is worth: 0 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: operator_installed -> failed: false, skipped: NA: false, bonus: {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0} [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: nodeport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: secrets_used -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_configmap -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: alpha_k8s_apis -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: require_labels -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: default_namespace -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 325, max tasks passed: 9 for tags: ["configuration"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1000, total tasks passed: 10 for tags: ["essential"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-06-19 23:18:44] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}]} [2025-06-19 23:18:44] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}]} [2025-06-19 23:18:44] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}]} [2025-06-19 23:18:44] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}], "maximum_points" => 325} [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:44] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:44] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [log_output] [2025-06-19 23:18:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Task.task_runner.log_output: Starting test [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:18:44] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Utils.logs: Dump logs of Deployment/coredns-coredns ✔️ 🏆PASSED: [log_output] Resources output logs to stdout and stderr 📶☠️ [2025-06-19 23:18:44] INFO -- CNTI-Log lines: [pod/coredns-coredns-6d479cd5cd-vfv4q/coredns] .:53 [pod/coredns-coredns-6d479cd5cd-vfv4q/coredns] [INFO] plugin/reload: Running configuration MD5 = d8c79061f144bdb41e9378f9aa781f71 [pod/coredns-coredns-6d479cd5cd-vfv4q/coredns] CoreDNS-1.8.0 [pod/coredns-coredns-6d479cd5cd-vfv4q/coredns] linux/amd64, go1.15.3, 054c9ae [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'log_output' emoji: 📶☠️ [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'log_output' tags: ["observability", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points: Task: 'log_output' type: essential [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'log_output' tags: ["observability", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points: Task: 'log_output' type: essential [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Points.upsert_task-log_output: Task start time: 2025-06-19 23:18:44 UTC, end time: 2025-06-19 23:18:44 UTC [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Points.upsert_task-log_output: Task: 'log_output' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.411527564 [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:18:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:18:44] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:18:44] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:18:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [prometheus_traffic] [2025-06-19 23:18:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:18:44] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:18:44] INFO -- CNTI-CNFManager.Task.task_runner.prometheus_traffic: Starting test [2025-06-19 23:18:44] INFO -- CNTI: find_matching_processes [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:18:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:18:46] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v131-worker, v131-worker2 [2025-06-19 23:18:46] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:46] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 8 pods: coredns-coredns-6d479cd5cd-vfv4q, cluster-tools-n9lh4, gatekeeper-audit-76b669b584-q6z5b, gatekeeper-controller-manager-84cc698fbc-4mbhm, create-loop-devs-gj76m, kindnet-htvqt, kube-proxy-h9krb, chaos-operator-ce-586f75ccbc-rcqjh [2025-06-19 23:18:46] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:15:23Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-zcnrg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:46] INFO -- CNTI: node_pid_by_container_id container_id: containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:18:46] INFO -- CNTI: parse_container_id container_id: containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:18:46] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:46] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:46] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:46] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:46] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:46] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:46Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:46Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:46] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\"\n }\n ]\n },\n \"pid\": 991870,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/991845/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/991845/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/991845/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.180.214\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.180.214:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"snapshotKey\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-19T23:15:21.881407058Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:15:23.595699326Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:46Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:46Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:46] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.180.214:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e" } ] }, "pid": 991870, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "io.kubernetes.cri.sandbox-name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/991845/ns/ipc", "type": "ipc" }, { "path": "/proc/991845/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/991845/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "COREDNS_COREDNS_SERVICE_HOST=10.96.180.214", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT=udp://10.96.180.214:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53", "KUBERNETES_PORT=tcp://10.96.0.1:443" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "snapshotKey": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-19T23:15:21.881407058Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-19T23:15:23.595699326Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:18:46] INFO -- CNTI: node_pid_by_container_id pid: 991870 [2025-06-19 23:18:46] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:46] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:46] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:46] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:46] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:47] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-06-19 23:18:47] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:47] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:47] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:47] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:47] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:47] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:47] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991870\nNgid:\t0\nPid:\t991870\nPPid:\t991820\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991870\t1\nNSpid:\t991870\t1\nNSpgid:\t991870\t1\nNSsid:\t991870\t1\nVmPeak:\t 748824 kB\nVmSize:\t 748824 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41176 kB\nVmRSS:\t 41176 kB\nRssAnon:\t 12272 kB\nRssFile:\t 28904 kB\nRssShmem:\t 0 kB\nVmData:\t 108936 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t19\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1428\nnonvoluntary_ctxt_switches:\t15\n", error: ""} [2025-06-19 23:18:47] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:47] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27", "image" => "docker.io/lfncnti/cluster-tools:v1.0.8", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:12:54Z"}}, "volumeMounts" => [{"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/host", "name" => "hostfs"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-ztvd2", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:47] INFO -- CNTI: node_pid_by_container_id container_id: containerd://d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27 [2025-06-19 23:18:47] INFO -- CNTI: parse_container_id container_id: containerd://d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27 [2025-06-19 23:18:47] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:47] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:47] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:47] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:47] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:47] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:48] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:48Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:48Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:48] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f\",\n \"user_specified_image\": \"lfncnti/cluster-tools:v1.0.8\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-n9lh4\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"de1da172-4054-4a52-a719-d1d625a68358\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 2\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"cluster-tools/0.log\",\n \"metadata\": {\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/run/systemd/\",\n \"host_path\": \"/run/systemd\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/proc\",\n \"host_path\": \"/proc\"\n },\n {\n \"container_path\": \"/host\",\n \"host_path\": \"/\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/volumes/kubernetes.io~projected/kube-api-access-ztvd2\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/containers/cluster-tools/fc1c432d\"\n }\n ]\n },\n \"pid\": 990003,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"cluster-tools\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"lfncnti/cluster-tools:v1.0.8\",\n \"io.kubernetes.cri.sandbox-id\": \"02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe\",\n \"io.kubernetes.cri.sandbox-name\": \"cluster-tools-n9lh4\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"de1da172-4054-4a52-a719-d1d625a68358\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-podde1da172_4054_4a52_a719_d1d625a68358.slice:cri-containerd:d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 1000,\n \"path\": \"/dev/loop1000\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/loop128\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/loop129\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/loop130\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/loop131\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/loop132\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/loop133\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/loop134\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 135,\n \"path\": \"/dev/loop135\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 136,\n \"path\": \"/dev/loop136\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 137,\n \"path\": \"/dev/loop137\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 138,\n \"path\": \"/dev/loop138\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 139,\n \"path\": \"/dev/loop139\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 140,\n \"path\": \"/dev/loop140\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 141,\n \"path\": \"/dev/loop141\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 142,\n \"path\": \"/dev/loop142\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 143,\n \"path\": \"/dev/loop143\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 144,\n \"path\": \"/dev/loop144\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 145,\n \"path\": \"/dev/loop145\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 146,\n \"path\": \"/dev/loop146\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 147,\n \"path\": \"/dev/loop147\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 148,\n \"path\": \"/dev/loop148\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 149,\n \"path\": \"/dev/loop149\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 150,\n \"path\": \"/dev/loop150\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 151,\n \"path\": \"/dev/loop151\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 152,\n \"path\": \"/dev/loop152\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 153,\n \"path\": \"/dev/loop153\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 154,\n \"path\": \"/dev/loop154\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 155,\n \"path\": \"/dev/loop155\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 156,\n \"path\": \"/dev/loop156\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 157,\n \"path\": \"/dev/loop157\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 158,\n \"path\": \"/dev/loop158\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 159,\n \"path\": \"/dev/loop159\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 160,\n \"path\": \"/dev/loop160\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 161,\n \"path\": \"/dev/loop161\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 162,\n \"path\": \"/dev/loop162\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 163,\n \"path\": \"/dev/loop163\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 164,\n \"path\": \"/dev/loop164\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 165,\n \"path\": \"/dev/loop165\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 166,\n \"path\": \"/dev/loop166\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 167,\n \"path\": \"/dev/loop167\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 168,\n \"path\": \"/dev/loop168\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 169,\n \"path\": \"/dev/loop169\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 170,\n \"path\": \"/dev/loop170\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 171,\n \"path\": \"/dev/loop171\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 172,\n \"path\": \"/dev/loop172\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 173,\n \"path\": \"/dev/loop173\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 174,\n \"path\": \"/dev/loop174\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 175,\n \"path\": \"/dev/loop175\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 176,\n \"path\": \"/dev/loop176\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 177,\n \"path\": \"/dev/loop177\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 178,\n \"path\": \"/dev/loop178\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 179,\n \"path\": \"/dev/loop179\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 180,\n \"path\": \"/dev/loop180\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 181,\n \"path\": \"/dev/loop181\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 182,\n \"path\": \"/dev/loop182\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 183,\n \"path\": \"/dev/loop183\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 184,\n \"path\": \"/dev/loop184\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 185,\n \"path\": \"/dev/loop185\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 186,\n \"path\": \"/dev/loop186\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 187,\n \"path\": \"/dev/loop187\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 188,\n \"path\": \"/dev/loop188\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 189,\n \"path\": \"/dev/loop189\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 190,\n \"path\": \"/dev/loop190\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 191,\n \"path\": \"/dev/loop191\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 192,\n \"path\": \"/dev/loop192\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 193,\n \"path\": \"/dev/loop193\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 194,\n \"path\": \"/dev/loop194\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 195,\n \"path\": \"/dev/loop195\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 196,\n \"path\": \"/dev/loop196\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 197,\n \"path\": \"/dev/loop197\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 198,\n \"path\": \"/dev/loop198\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 199,\n \"path\": \"/dev/loop199\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 200,\n \"path\": \"/dev/loop200\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 201,\n \"path\": \"/dev/loop201\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 202,\n \"path\": \"/dev/loop202\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 203,\n \"path\": \"/dev/loop203\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 204,\n \"path\": \"/dev/loop204\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 205,\n \"path\": \"/dev/loop205\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 206,\n \"path\": \"/dev/loop206\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 207,\n \"path\": \"/dev/loop207\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 208,\n \"path\": \"/dev/loop208\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 209,\n \"path\": \"/dev/loop209\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 210,\n \"path\": \"/dev/loop210\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 211,\n \"path\": \"/dev/loop211\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 212,\n \"path\": \"/dev/loop212\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 213,\n \"path\": \"/dev/loop213\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 214,\n \"path\": \"/dev/loop214\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 215,\n \"path\": \"/dev/loop215\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 216,\n \"path\": \"/dev/loop216\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 217,\n \"path\": \"/dev/loop217\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 218,\n \"path\": \"/dev/loop218\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 219,\n \"path\": \"/dev/loop219\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 220,\n \"path\": \"/dev/loop220\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 221,\n \"path\": \"/dev/loop221\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 222,\n \"path\": \"/dev/loop222\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 223,\n \"path\": \"/dev/loop223\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 224,\n \"path\": \"/dev/loop224\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 225,\n \"path\": \"/dev/loop225\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 226,\n \"path\": \"/dev/loop226\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 227,\n \"path\": \"/dev/loop227\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 228,\n \"path\": \"/dev/loop228\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 229,\n \"path\": \"/dev/loop229\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 230,\n \"path\": \"/dev/loop230\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 231,\n \"path\": \"/dev/loop231\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 232,\n \"path\": \"/dev/loop232\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 233,\n \"path\": \"/dev/loop233\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 234,\n \"path\": \"/dev/loop234\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 235,\n \"path\": \"/dev/loop235\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 236,\n \"path\": \"/dev/loop236\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 237,\n \"path\": \"/dev/loop237\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 238,\n \"path\": \"/dev/loop238\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 239,\n \"path\": \"/dev/loop239\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 240,\n \"path\": \"/dev/loop240\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 241,\n \"path\": \"/dev/loop241\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 242,\n \"path\": \"/dev/loop242\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 243,\n \"path\": \"/dev/loop243\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 244,\n \"path\": \"/dev/loop244\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 245,\n \"path\": \"/dev/loop245\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 246,\n \"path\": \"/dev/loop246\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 247,\n \"path\": \"/dev/loop247\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 248,\n \"path\": \"/dev/loop248\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 249,\n \"path\": \"/dev/loop249\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 250,\n \"path\": \"/dev/loop250\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 251,\n \"path\": \"/dev/loop251\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 252,\n \"path\": \"/dev/loop252\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 253,\n \"path\": \"/dev/loop253\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 254,\n \"path\": \"/dev/loop254\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 255,\n \"path\": \"/dev/loop255\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 256,\n \"path\": \"/dev/loop256\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 257,\n \"path\": \"/dev/loop257\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 258,\n \"path\": \"/dev/loop258\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 259,\n \"path\": \"/dev/loop259\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 260,\n \"path\": \"/dev/loop260\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 261,\n \"path\": \"/dev/loop261\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 262,\n \"path\": \"/dev/loop262\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 263,\n \"path\": \"/dev/loop263\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 264,\n \"path\": \"/dev/loop264\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 265,\n \"path\": \"/dev/loop265\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 266,\n \"path\": \"/dev/loop266\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 267,\n \"path\": \"/dev/loop267\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 268,\n \"path\": \"/dev/loop268\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 269,\n \"path\": \"/dev/loop269\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 270,\n \"path\": \"/dev/loop270\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 271,\n \"path\": \"/dev/loop271\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 272,\n \"path\": \"/dev/loop272\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 273,\n \"path\": \"/dev/loop273\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 274,\n \"path\": \"/dev/loop274\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 275,\n \"path\": \"/dev/loop275\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 276,\n \"path\": \"/dev/loop276\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 277,\n \"path\": \"/dev/loop277\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 278,\n \"path\": \"/dev/loop278\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 279,\n \"path\": \"/dev/loop279\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 280,\n \"path\": \"/dev/loop280\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 281,\n \"path\": \"/dev/loop281\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 282,\n \"path\": \"/dev/loop282\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 283,\n \"path\": \"/dev/loop283\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 284,\n \"path\": \"/dev/loop284\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 285,\n \"path\": \"/dev/loop285\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 286,\n \"path\": \"/dev/loop286\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 287,\n \"path\": \"/dev/loop287\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 288,\n \"path\": \"/dev/loop288\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 289,\n \"path\": \"/dev/loop289\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 290,\n \"path\": \"/dev/loop290\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 291,\n \"path\": \"/dev/loop291\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 292,\n \"path\": \"/dev/loop292\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 293,\n \"path\": \"/dev/loop293\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 294,\n \"path\": \"/dev/loop294\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 295,\n \"path\": \"/dev/loop295\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 296,\n \"path\": \"/dev/loop296\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 297,\n \"path\": \"/dev/loop297\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 298,\n \"path\": \"/dev/loop298\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 299,\n \"path\": \"/dev/loop299\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 300,\n \"path\": \"/dev/loop300\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 301,\n \"path\": \"/dev/loop301\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 302,\n \"path\": \"/dev/loop302\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 303,\n \"path\": \"/dev/loop303\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 304,\n \"path\": \"/dev/loop304\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 305,\n \"path\": \"/dev/loop305\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 306,\n \"path\": \"/dev/loop306\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 307,\n \"path\": \"/dev/loop307\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 308,\n \"path\": \"/dev/loop308\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 309,\n \"path\": \"/dev/loop309\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 310,\n \"path\": \"/dev/loop310\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 311,\n \"path\": \"/dev/loop311\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 312,\n \"path\": \"/dev/loop312\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 313,\n \"path\": \"/dev/loop313\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 314,\n \"path\": \"/dev/loop314\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 315,\n \"path\": \"/dev/loop315\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 316,\n \"path\": \"/dev/loop316\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 317,\n \"path\": \"/dev/loop317\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 318,\n \"path\": \"/dev/loop318\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 319,\n \"path\": \"/dev/loop319\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 320,\n \"path\": \"/dev/loop320\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 321,\n \"path\": \"/dev/loop321\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 322,\n \"path\": \"/dev/loop322\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 323,\n \"path\": \"/dev/loop323\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 324,\n \"path\": \"/dev/loop324\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 325,\n \"path\": \"/dev/loop325\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 326,\n \"path\": \"/dev/loop326\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 327,\n \"path\": \"/dev/loop327\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 328,\n \"path\": \"/dev/loop328\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 329,\n \"path\": \"/dev/loop329\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 330,\n \"path\": \"/dev/loop330\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 331,\n \"path\": \"/dev/loop331\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 332,\n \"path\": \"/dev/loop332\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 333,\n \"path\": \"/dev/loop333\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 334,\n \"path\": \"/dev/loop334\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 335,\n \"path\": \"/dev/loop335\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 336,\n \"path\": \"/dev/loop336\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 337,\n \"path\": \"/dev/loop337\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 338,\n \"path\": \"/dev/loop338\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 339,\n \"path\": \"/dev/loop339\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 340,\n \"path\": \"/dev/loop340\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 341,\n \"path\": \"/dev/loop341\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 342,\n \"path\": \"/dev/loop342\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 343,\n \"path\": \"/dev/loop343\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 344,\n \"path\": \"/dev/loop344\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 345,\n \"path\": \"/dev/loop345\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 346,\n \"path\": \"/dev/loop346\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 347,\n \"path\": \"/dev/loop347\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 348,\n \"path\": \"/dev/loop348\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 349,\n \"path\": \"/dev/loop349\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 350,\n \"path\": \"/dev/loop350\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 351,\n \"path\": \"/dev/loop351\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 352,\n \"path\": \"/dev/loop352\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 353,\n \"path\": \"/dev/loop353\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 354,\n \"path\": \"/dev/loop354\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 355,\n \"path\": \"/dev/loop355\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 356,\n \"path\": \"/dev/loop356\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 357,\n \"path\": \"/dev/loop357\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 358,\n \"path\": \"/dev/loop358\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 359,\n \"path\": \"/dev/loop359\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 360,\n \"path\": \"/dev/loop360\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 361,\n \"path\": \"/dev/loop361\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 362,\n \"path\": \"/dev/loop362\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 363,\n \"path\": \"/dev/loop363\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 364,\n \"path\": \"/dev/loop364\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 365,\n \"path\": \"/dev/loop365\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 366,\n \"path\": \"/dev/loop366\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 367,\n \"path\": \"/dev/loop367\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 368,\n \"path\": \"/dev/loop368\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 369,\n \"path\": \"/dev/loop369\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 370,\n \"path\": \"/dev/loop370\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 371,\n \"path\": \"/dev/loop371\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 372,\n \"path\": \"/dev/loop372\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 373,\n \"path\": \"/dev/loop373\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 374,\n \"path\": \"/dev/loop374\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 375,\n \"path\": \"/dev/loop375\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 376,\n \"path\": \"/dev/loop376\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 377,\n \"path\": \"/dev/loop377\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 378,\n \"path\": \"/dev/loop378\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 379,\n \"path\": \"/dev/loop379\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 380,\n \"path\": \"/dev/loop380\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 381,\n \"path\": \"/dev/loop381\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 382,\n \"path\": \"/dev/loop382\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 383,\n \"path\": \"/dev/loop383\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 384,\n \"path\": \"/dev/loop384\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 385,\n \"path\": \"/dev/loop385\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 386,\n \"path\": \"/dev/loop386\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 387,\n \"path\": \"/dev/loop387\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 388,\n \"path\": \"/dev/loop388\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 389,\n \"path\": \"/dev/loop389\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 390,\n \"path\": \"/dev/loop390\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 391,\n \"path\": \"/dev/loop391\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 392,\n \"path\": \"/dev/loop392\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 393,\n \"path\": \"/dev/loop393\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 394,\n \"path\": \"/dev/loop394\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 395,\n \"path\": \"/dev/loop395\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 396,\n \"path\": \"/dev/loop396\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 397,\n \"path\": \"/dev/loop397\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 398,\n \"path\": \"/dev/loop398\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 399,\n \"path\": \"/dev/loop399\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 400,\n \"path\": \"/dev/loop400\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 401,\n \"path\": \"/dev/loop401\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 402,\n \"path\": \"/dev/loop402\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 403,\n \"path\": \"/dev/loop403\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 404,\n \"path\": \"/dev/loop404\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 405,\n \"path\": \"/dev/loop405\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 406,\n \"path\": \"/dev/loop406\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 407,\n \"path\": \"/dev/loop407\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 408,\n \"path\": \"/dev/loop408\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 409,\n \"path\": \"/dev/loop409\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 410,\n \"path\": \"/dev/loop410\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 411,\n \"path\": \"/dev/loop411\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 412,\n \"path\": \"/dev/loop412\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 413,\n \"path\": \"/dev/loop413\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 414,\n \"path\": \"/dev/loop414\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 415,\n \"path\": \"/dev/loop415\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 416,\n \"path\": \"/dev/loop416\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 417,\n \"path\": \"/dev/loop417\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 418,\n \"path\": \"/dev/loop418\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 419,\n \"path\": \"/dev/loop419\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 420,\n \"path\": \"/dev/loop420\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 421,\n \"path\": \"/dev/loop421\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 422,\n \"path\": \"/dev/loop422\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 423,\n \"path\": \"/dev/loop423\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 424,\n \"path\": \"/dev/loop424\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 425,\n \"path\": \"/dev/loop425\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 426,\n \"path\": \"/dev/loop426\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 427,\n \"path\": \"/dev/loop427\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 428,\n \"path\": \"/dev/loop428\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 429,\n \"path\": \"/dev/loop429\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 430,\n \"path\": \"/dev/loop430\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 431,\n \"path\": \"/dev/loop431\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 432,\n \"path\": \"/dev/loop432\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 433,\n \"path\": \"/dev/loop433\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 434,\n \"path\": \"/dev/loop434\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 435,\n \"path\": \"/dev/loop435\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 436,\n \"path\": \"/dev/loop436\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 437,\n \"path\": \"/dev/loop437\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 438,\n \"path\": \"/dev/loop438\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 439,\n \"path\": \"/dev/loop439\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 440,\n \"path\": \"/dev/loop440\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 441,\n \"path\": \"/dev/loop441\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 442,\n \"path\": \"/dev/loop442\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 443,\n \"path\": \"/dev/loop443\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 444,\n \"path\": \"/dev/loop444\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 445,\n \"path\": \"/dev/loop445\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 446,\n \"path\": \"/dev/loop446\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 447,\n \"path\": \"/dev/loop447\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 448,\n \"path\": \"/dev/loop448\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 449,\n \"path\": \"/dev/loop449\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 450,\n \"path\": \"/dev/loop450\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 451,\n \"path\": \"/dev/loop451\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 452,\n \"path\": \"/dev/loop452\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 453,\n \"path\": \"/dev/loop453\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 454,\n \"path\": \"/dev/loop454\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 455,\n \"path\": \"/dev/loop455\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 456,\n \"path\": \"/dev/loop456\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 457,\n \"path\": \"/dev/loop457\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 458,\n \"path\": \"/dev/loop458\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 459,\n \"path\": \"/dev/loop459\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 460,\n \"path\": \"/dev/loop460\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 461,\n \"path\": \"/dev/loop461\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 462,\n \"path\": \"/dev/loop462\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 463,\n \"path\": \"/dev/loop463\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 464,\n \"path\": \"/dev/loop464\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 465,\n \"path\": \"/dev/loop465\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 466,\n \"path\": \"/dev/loop466\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 467,\n \"path\": \"/dev/loop467\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 468,\n \"path\": \"/dev/loop468\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 469,\n \"path\": \"/dev/loop469\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 470,\n \"path\": \"/dev/loop470\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 471,\n \"path\": \"/dev/loop471\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 472,\n \"path\": \"/dev/loop472\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 473,\n \"path\": \"/dev/loop473\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 474,\n \"path\": \"/dev/loop474\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 475,\n \"path\": \"/dev/loop475\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 476,\n \"path\": \"/dev/loop476\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 477,\n \"path\": \"/dev/loop477\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 478,\n \"path\": \"/dev/loop478\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 479,\n \"path\": \"/dev/loop479\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 480,\n \"path\": \"/dev/loop480\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 481,\n \"path\": \"/dev/loop481\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 482,\n \"path\": \"/dev/loop482\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 483,\n \"path\": \"/dev/loop483\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 484,\n \"path\": \"/dev/loop484\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 485,\n \"path\": \"/dev/loop485\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 486,\n \"path\": \"/dev/loop486\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 487,\n \"path\": \"/dev/loop487\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 488,\n \"path\": \"/dev/loop488\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 489,\n \"path\": \"/dev/loop489\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 490,\n \"path\": \"/dev/loop490\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 491,\n \"path\": \"/dev/loop491\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 492,\n \"path\": \"/dev/loop492\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 493,\n \"path\": \"/dev/loop493\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 494,\n \"path\": \"/dev/loop494\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 495,\n \"path\": \"/dev/loop495\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 496,\n \"path\": \"/dev/loop496\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 497,\n \"path\": \"/dev/loop497\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 498,\n \"path\": \"/dev/loop498\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 499,\n \"path\": \"/dev/loop499\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 500,\n \"path\": \"/dev/loop500\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 501,\n \"path\": \"/dev/loop501\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 502,\n \"path\": \"/dev/loop502\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 503,\n \"path\": \"/dev/loop503\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 504,\n \"path\": \"/dev/loop504\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 505,\n \"path\": \"/dev/loop505\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 506,\n \"path\": \"/dev/loop506\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 507,\n \"path\": \"/dev/loop507\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 508,\n \"path\": \"/dev/loop508\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 509,\n \"path\": \"/dev/loop509\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 510,\n \"path\": \"/dev/loop510\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 511,\n \"path\": \"/dev/loop511\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 512,\n \"path\": \"/dev/loop512\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 513,\n \"path\": \"/dev/loop513\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 514,\n \"path\": \"/dev/loop514\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 515,\n \"path\": \"/dev/loop515\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 516,\n \"path\": \"/dev/loop516\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 517,\n \"path\": \"/dev/loop517\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 518,\n \"path\": \"/dev/loop518\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 519,\n \"path\": \"/dev/loop519\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 520,\n \"path\": \"/dev/loop520\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 521,\n \"path\": \"/dev/loop521\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 522,\n \"path\": \"/dev/loop522\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 523,\n \"path\": \"/dev/loop523\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 524,\n \"path\": \"/dev/loop524\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 525,\n \"path\": \"/dev/loop525\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 526,\n \"path\": \"/dev/loop526\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 527,\n \"path\": \"/dev/loop527\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 528,\n \"path\": \"/dev/loop528\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 529,\n \"path\": \"/dev/loop529\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 530,\n \"path\": \"/dev/loop530\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 531,\n \"path\": \"/dev/loop531\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 532,\n \"path\": \"/dev/loop532\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 533,\n \"path\": \"/dev/loop533\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 534,\n \"path\": \"/dev/loop534\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 535,\n \"path\": \"/dev/loop535\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 536,\n \"path\": \"/dev/loop536\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 537,\n \"path\": \"/dev/loop537\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 538,\n \"path\": \"/dev/loop538\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 539,\n \"path\": \"/dev/loop539\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 540,\n \"path\": \"/dev/loop540\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 541,\n \"path\": \"/dev/loop541\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 542,\n \"path\": \"/dev/loop542\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 543,\n \"path\": \"/dev/loop543\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 544,\n \"path\": \"/dev/loop544\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 545,\n \"path\": \"/dev/loop545\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 546,\n \"path\": \"/dev/loop546\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 547,\n \"path\": \"/dev/loop547\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 548,\n \"path\": \"/dev/loop548\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 549,\n \"path\": \"/dev/loop549\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 550,\n \"path\": \"/dev/loop550\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 551,\n \"path\": \"/dev/loop551\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 552,\n \"path\": \"/dev/loop552\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 553,\n \"path\": \"/dev/loop553\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 554,\n \"path\": \"/dev/loop554\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 555,\n \"path\": \"/dev/loop555\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 556,\n \"path\": \"/dev/loop556\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 557,\n \"path\": \"/dev/loop557\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 558,\n \"path\": \"/dev/loop558\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 559,\n \"path\": \"/dev/loop559\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 560,\n \"path\": \"/dev/loop560\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 561,\n \"path\": \"/dev/loop561\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 562,\n \"path\": \"/dev/loop562\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 563,\n \"path\": \"/dev/loop563\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 564,\n \"path\": \"/dev/loop564\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 565,\n \"path\": \"/dev/loop565\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 566,\n \"path\": \"/dev/loop566\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 567,\n \"path\": \"/dev/loop567\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 568,\n \"path\": \"/dev/loop568\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 569,\n \"path\": \"/dev/loop569\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 570,\n \"path\": \"/dev/loop570\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 571,\n \"path\": \"/dev/loop571\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 572,\n \"path\": \"/dev/loop572\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 573,\n \"path\": \"/dev/loop573\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 574,\n \"path\": \"/dev/loop574\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 575,\n \"path\": \"/dev/loop575\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 576,\n \"path\": \"/dev/loop576\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 577,\n \"path\": \"/dev/loop577\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 578,\n \"path\": \"/dev/loop578\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 579,\n \"path\": \"/dev/loop579\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 580,\n \"path\": \"/dev/loop580\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 581,\n \"path\": \"/dev/loop581\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 582,\n \"path\": \"/dev/loop582\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 583,\n \"path\": \"/dev/loop583\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 584,\n \"path\": \"/dev/loop584\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 585,\n \"path\": \"/dev/loop585\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 586,\n \"path\": \"/dev/loop586\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 587,\n \"path\": \"/dev/loop587\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 588,\n \"path\": \"/dev/loop588\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 589,\n \"path\": \"/dev/loop589\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 590,\n \"path\": \"/dev/loop590\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 591,\n \"path\": \"/dev/loop591\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 592,\n \"path\": \"/dev/loop592\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 593,\n \"path\": \"/dev/loop593\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 594,\n \"path\": \"/dev/loop594\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 595,\n \"path\": \"/dev/loop595\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 596,\n \"path\": \"/dev/loop596\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 597,\n \"path\": \"/dev/loop597\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 598,\n \"path\": \"/dev/loop598\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 599,\n \"path\": \"/dev/loop599\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 600,\n \"path\": \"/dev/loop600\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 601,\n \"path\": \"/dev/loop601\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 602,\n \"path\": \"/dev/loop602\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 603,\n \"path\": \"/dev/loop603\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 604,\n \"path\": \"/dev/loop604\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 605,\n \"path\": \"/dev/loop605\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 606,\n \"path\": \"/dev/loop606\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 607,\n \"path\": \"/dev/loop607\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 608,\n \"path\": \"/dev/loop608\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 609,\n \"path\": \"/dev/loop609\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 610,\n \"path\": \"/dev/loop610\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 611,\n \"path\": \"/dev/loop611\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 612,\n \"path\": \"/dev/loop612\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 613,\n \"path\": \"/dev/loop613\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 614,\n \"path\": \"/dev/loop614\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 615,\n \"path\": \"/dev/loop615\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 616,\n \"path\": \"/dev/loop616\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 617,\n \"path\": \"/dev/loop617\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 618,\n \"path\": \"/dev/loop618\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 619,\n \"path\": \"/dev/loop619\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 620,\n \"path\": \"/dev/loop620\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 621,\n \"path\": \"/dev/loop621\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 622,\n \"path\": \"/dev/loop622\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 623,\n \"path\": \"/dev/loop623\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 624,\n \"path\": \"/dev/loop624\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 625,\n \"path\": \"/dev/loop625\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 626,\n \"path\": \"/dev/loop626\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 627,\n \"path\": \"/dev/loop627\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 628,\n \"path\": \"/dev/loop628\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 629,\n \"path\": \"/dev/loop629\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 630,\n \"path\": \"/dev/loop630\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 631,\n \"path\": \"/dev/loop631\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 632,\n \"path\": \"/dev/loop632\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 633,\n \"path\": \"/dev/loop633\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 634,\n \"path\": \"/dev/loop634\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 635,\n \"path\": \"/dev/loop635\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 636,\n \"path\": \"/dev/loop636\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 637,\n \"path\": \"/dev/loop637\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 638,\n \"path\": \"/dev/loop638\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 639,\n \"path\": \"/dev/loop639\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 640,\n \"path\": \"/dev/loop640\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 641,\n \"path\": \"/dev/loop641\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 642,\n \"path\": \"/dev/loop642\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 643,\n \"path\": \"/dev/loop643\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 644,\n \"path\": \"/dev/loop644\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 645,\n \"path\": \"/dev/loop645\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 646,\n \"path\": \"/dev/loop646\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 647,\n \"path\": \"/dev/loop647\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 648,\n \"path\": \"/dev/loop648\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 649,\n \"path\": \"/dev/loop649\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 650,\n \"path\": \"/dev/loop650\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 651,\n \"path\": \"/dev/loop651\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 652,\n \"path\": \"/dev/loop652\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 653,\n \"path\": \"/dev/loop653\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 654,\n \"path\": \"/dev/loop654\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 655,\n \"path\": \"/dev/loop655\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 656,\n \"path\": \"/dev/loop656\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 657,\n \"path\": \"/dev/loop657\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 658,\n \"path\": \"/dev/loop658\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 659,\n \"path\": \"/dev/loop659\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 660,\n \"path\": \"/dev/loop660\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 661,\n \"path\": \"/dev/loop661\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 662,\n \"path\": \"/dev/loop662\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 663,\n \"path\": \"/dev/loop663\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 664,\n \"path\": \"/dev/loop664\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 665,\n \"path\": \"/dev/loop665\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 666,\n \"path\": \"/dev/loop666\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 667,\n \"path\": \"/dev/loop667\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 668,\n \"path\": \"/dev/loop668\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 669,\n \"path\": \"/dev/loop669\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 670,\n \"path\": \"/dev/loop670\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 671,\n \"path\": \"/dev/loop671\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 672,\n \"path\": \"/dev/loop672\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 673,\n \"path\": \"/dev/loop673\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 674,\n \"path\": \"/dev/loop674\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 675,\n \"path\": \"/dev/loop675\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 676,\n \"path\": \"/dev/loop676\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 677,\n \"path\": \"/dev/loop677\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 678,\n \"path\": \"/dev/loop678\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 679,\n \"path\": \"/dev/loop679\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 680,\n \"path\": \"/dev/loop680\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 681,\n \"path\": \"/dev/loop681\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 682,\n \"path\": \"/dev/loop682\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 683,\n \"path\": \"/dev/loop683\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 684,\n \"path\": \"/dev/loop684\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 685,\n \"path\": \"/dev/loop685\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 686,\n \"path\": \"/dev/loop686\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 687,\n \"path\": \"/dev/loop687\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 688,\n \"path\": \"/dev/loop688\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 689,\n \"path\": \"/dev/loop689\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 690,\n \"path\": \"/dev/loop690\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 691,\n \"path\": \"/dev/loop691\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 692,\n \"path\": \"/dev/loop692\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 693,\n \"path\": \"/dev/loop693\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 694,\n \"path\": \"/dev/loop694\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 695,\n \"path\": \"/dev/loop695\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 696,\n \"path\": \"/dev/loop696\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 697,\n \"path\": \"/dev/loop697\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 698,\n \"path\": \"/dev/loop698\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 699,\n \"path\": \"/dev/loop699\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 700,\n \"path\": \"/dev/loop700\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 701,\n \"path\": \"/dev/loop701\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 702,\n \"path\": \"/dev/loop702\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 703,\n \"path\": \"/dev/loop703\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 704,\n \"path\": \"/dev/loop704\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 705,\n \"path\": \"/dev/loop705\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 706,\n \"path\": \"/dev/loop706\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 707,\n \"path\": \"/dev/loop707\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 708,\n \"path\": \"/dev/loop708\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 709,\n \"path\": \"/dev/loop709\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 710,\n \"path\": \"/dev/loop710\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 711,\n \"path\": \"/dev/loop711\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 712,\n \"path\": \"/dev/loop712\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 713,\n \"path\": \"/dev/loop713\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 714,\n \"path\": \"/dev/loop714\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 715,\n \"path\": \"/dev/loop715\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 716,\n \"path\": \"/dev/loop716\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 717,\n \"path\": \"/dev/loop717\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 718,\n \"path\": \"/dev/loop718\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 719,\n \"path\": \"/dev/loop719\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 720,\n \"path\": \"/dev/loop720\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 721,\n \"path\": \"/dev/loop721\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 722,\n \"path\": \"/dev/loop722\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 723,\n \"path\": \"/dev/loop723\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 724,\n \"path\": \"/dev/loop724\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 725,\n \"path\": \"/dev/loop725\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 726,\n \"path\": \"/dev/loop726\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 727,\n \"path\": \"/dev/loop727\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 728,\n \"path\": \"/dev/loop728\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 729,\n \"path\": \"/dev/loop729\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 730,\n \"path\": \"/dev/loop730\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 731,\n \"path\": \"/dev/loop731\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 732,\n \"path\": \"/dev/loop732\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 733,\n \"path\": \"/dev/loop733\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 734,\n \"path\": \"/dev/loop734\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 735,\n \"path\": \"/dev/loop735\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 736,\n \"path\": \"/dev/loop736\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 737,\n \"path\": \"/dev/loop737\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 738,\n \"path\": \"/dev/loop738\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 739,\n \"path\": \"/dev/loop739\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 740,\n \"path\": \"/dev/loop740\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 741,\n \"path\": \"/dev/loop741\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 742,\n \"path\": \"/dev/loop742\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 743,\n \"path\": \"/dev/loop743\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 744,\n \"path\": \"/dev/loop744\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 745,\n \"path\": \"/dev/loop745\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 746,\n \"path\": \"/dev/loop746\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 747,\n \"path\": \"/dev/loop747\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 748,\n \"path\": \"/dev/loop748\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 749,\n \"path\": \"/dev/loop749\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 750,\n \"path\": \"/dev/loop750\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 751,\n \"path\": \"/dev/loop751\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 752,\n \"path\": \"/dev/loop752\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 753,\n \"path\": \"/dev/loop753\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 754,\n \"path\": \"/dev/loop754\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 755,\n \"path\": \"/dev/loop755\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 756,\n \"path\": \"/dev/loop756\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 757,\n \"path\": \"/dev/loop757\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 758,\n \"path\": \"/dev/loop758\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 759,\n \"path\": \"/dev/loop759\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 760,\n \"path\": \"/dev/loop760\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 761,\n \"path\": \"/dev/loop761\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 762,\n \"path\": \"/dev/loop762\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 763,\n \"path\": \"/dev/loop763\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 764,\n \"path\": \"/dev/loop764\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 765,\n \"path\": \"/dev/loop765\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 766,\n \"path\": \"/dev/loop766\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 767,\n \"path\": \"/dev/loop767\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 768,\n \"path\": \"/dev/loop768\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 769,\n \"path\": \"/dev/loop769\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 770,\n \"path\": \"/dev/loop770\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 771,\n \"path\": \"/dev/loop771\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 772,\n \"path\": \"/dev/loop772\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 773,\n \"path\": \"/dev/loop773\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 774,\n \"path\": \"/dev/loop774\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 775,\n \"path\": \"/dev/loop775\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 776,\n \"path\": \"/dev/loop776\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 777,\n \"path\": \"/dev/loop777\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 778,\n \"path\": \"/dev/loop778\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 779,\n \"path\": \"/dev/loop779\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 780,\n \"path\": \"/dev/loop780\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 781,\n \"path\": \"/dev/loop781\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 782,\n \"path\": \"/dev/loop782\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 783,\n \"path\": \"/dev/loop783\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 784,\n \"path\": \"/dev/loop784\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 785,\n \"path\": \"/dev/loop785\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 786,\n \"path\": \"/dev/loop786\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 787,\n \"path\": \"/dev/loop787\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 788,\n \"path\": \"/dev/loop788\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 789,\n \"path\": \"/dev/loop789\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 790,\n \"path\": \"/dev/loop790\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 791,\n \"path\": \"/dev/loop791\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 792,\n \"path\": \"/dev/loop792\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 793,\n \"path\": \"/dev/loop793\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 794,\n \"path\": \"/dev/loop794\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 795,\n \"path\": \"/dev/loop795\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 796,\n \"path\": \"/dev/loop796\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 797,\n \"path\": \"/dev/loop797\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 798,\n \"path\": \"/dev/loop798\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 799,\n \"path\": \"/dev/loop799\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 800,\n \"path\": \"/dev/loop800\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 801,\n \"path\": \"/dev/loop801\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 802,\n \"path\": \"/dev/loop802\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 803,\n \"path\": \"/dev/loop803\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 804,\n \"path\": \"/dev/loop804\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 805,\n \"path\": \"/dev/loop805\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 806,\n \"path\": \"/dev/loop806\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 807,\n \"path\": \"/dev/loop807\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 808,\n \"path\": \"/dev/loop808\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 809,\n \"path\": \"/dev/loop809\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 810,\n \"path\": \"/dev/loop810\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 811,\n \"path\": \"/dev/loop811\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 812,\n \"path\": \"/dev/loop812\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 813,\n \"path\": \"/dev/loop813\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 814,\n \"path\": \"/dev/loop814\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 815,\n \"path\": \"/dev/loop815\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 816,\n \"path\": \"/dev/loop816\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 817,\n \"path\": \"/dev/loop817\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 818,\n \"path\": \"/dev/loop818\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 819,\n \"path\": \"/dev/loop819\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 820,\n \"path\": \"/dev/loop820\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 821,\n \"path\": \"/dev/loop821\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 822,\n \"path\": \"/dev/loop822\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 823,\n \"path\": \"/dev/loop823\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 824,\n \"path\": \"/dev/loop824\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 825,\n \"path\": \"/dev/loop825\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 826,\n \"path\": \"/dev/loop826\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 827,\n \"path\": \"/dev/loop827\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 828,\n \"path\": \"/dev/loop828\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 829,\n \"path\": \"/dev/loop829\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 830,\n \"path\": \"/dev/loop830\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 831,\n \"path\": \"/dev/loop831\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 832,\n \"path\": \"/dev/loop832\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 833,\n \"path\": \"/dev/loop833\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 834,\n \"path\": \"/dev/loop834\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 835,\n \"path\": \"/dev/loop835\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 836,\n \"path\": \"/dev/loop836\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 837,\n \"path\": \"/dev/loop837\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 838,\n \"path\": \"/dev/loop838\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 839,\n \"path\": \"/dev/loop839\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 840,\n \"path\": \"/dev/loop840\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 841,\n \"path\": \"/dev/loop841\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 842,\n \"path\": \"/dev/loop842\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 843,\n \"path\": \"/dev/loop843\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 844,\n \"path\": \"/dev/loop844\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 845,\n \"path\": \"/dev/loop845\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 846,\n \"path\": \"/dev/loop846\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 847,\n \"path\": \"/dev/loop847\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 848,\n \"path\": \"/dev/loop848\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 849,\n \"path\": \"/dev/loop849\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 850,\n \"path\": \"/dev/loop850\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 851,\n \"path\": \"/dev/loop851\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 852,\n \"path\": \"/dev/loop852\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 853,\n \"path\": \"/dev/loop853\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 854,\n \"path\": \"/dev/loop854\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 855,\n \"path\": \"/dev/loop855\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 856,\n \"path\": \"/dev/loop856\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 857,\n \"path\": \"/dev/loop857\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 858,\n \"path\": \"/dev/loop858\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 859,\n \"path\": \"/dev/loop859\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 860,\n \"path\": \"/dev/loop860\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 861,\n \"path\": \"/dev/loop861\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 862,\n \"path\": \"/dev/loop862\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 863,\n \"path\": \"/dev/loop863\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 864,\n \"path\": \"/dev/loop864\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 865,\n \"path\": \"/dev/loop865\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 866,\n \"path\": \"/dev/loop866\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 867,\n \"path\": \"/dev/loop867\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 868,\n \"path\": \"/dev/loop868\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 869,\n \"path\": \"/dev/loop869\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 870,\n \"path\": \"/dev/loop870\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 871,\n \"path\": \"/dev/loop871\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 872,\n \"path\": \"/dev/loop872\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 873,\n \"path\": \"/dev/loop873\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 874,\n \"path\": \"/dev/loop874\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 875,\n \"path\": \"/dev/loop875\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 876,\n \"path\": \"/dev/loop876\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 877,\n \"path\": \"/dev/loop877\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 878,\n \"path\": \"/dev/loop878\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 879,\n \"path\": \"/dev/loop879\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 880,\n \"path\": \"/dev/loop880\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 881,\n \"path\": \"/dev/loop881\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 882,\n \"path\": \"/dev/loop882\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 883,\n \"path\": \"/dev/loop883\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 884,\n \"path\": \"/dev/loop884\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 885,\n \"path\": \"/dev/loop885\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 886,\n \"path\": \"/dev/loop886\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 887,\n \"path\": \"/dev/loop887\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 888,\n \"path\": \"/dev/loop888\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 889,\n \"path\": \"/dev/loop889\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 890,\n \"path\": \"/dev/loop890\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 891,\n \"path\": \"/dev/loop891\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 892,\n \"path\": \"/dev/loop892\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 893,\n \"path\": \"/dev/loop893\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 894,\n \"path\": \"/dev/loop894\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 895,\n \"path\": \"/dev/loop895\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 896,\n \"path\": \"/dev/loop896\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 897,\n \"path\": \"/dev/loop897\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 898,\n \"path\": \"/dev/loop898\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 899,\n \"path\": \"/dev/loop899\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 900,\n \"path\": \"/dev/loop900\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 901,\n \"path\": \"/dev/loop901\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 902,\n \"path\": \"/dev/loop902\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 903,\n \"path\": \"/dev/loop903\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 904,\n \"path\": \"/dev/loop904\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 905,\n \"path\": \"/dev/loop905\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 906,\n \"path\": \"/dev/loop906\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 907,\n \"path\": \"/dev/loop907\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 908,\n \"path\": \"/dev/loop908\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 909,\n \"path\": \"/dev/loop909\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 910,\n \"path\": \"/dev/loop910\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 911,\n \"path\": \"/dev/loop911\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 912,\n \"path\": \"/dev/loop912\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 913,\n \"path\": \"/dev/loop913\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 914,\n \"path\": \"/dev/loop914\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 915,\n \"path\": \"/dev/loop915\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 916,\n \"path\": \"/dev/loop916\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 917,\n \"path\": \"/dev/loop917\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 918,\n \"path\": \"/dev/loop918\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 919,\n \"path\": \"/dev/loop919\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 920,\n \"path\": \"/dev/loop920\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 921,\n \"path\": \"/dev/loop921\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 922,\n \"path\": \"/dev/loop922\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 923,\n \"path\": \"/dev/loop923\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 924,\n \"path\": \"/dev/loop924\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 925,\n \"path\": \"/dev/loop925\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 926,\n \"path\": \"/dev/loop926\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 927,\n \"path\": \"/dev/loop927\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 928,\n \"path\": \"/dev/loop928\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 929,\n \"path\": \"/dev/loop929\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 930,\n \"path\": \"/dev/loop930\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 931,\n \"path\": \"/dev/loop931\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 932,\n \"path\": \"/dev/loop932\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 933,\n \"path\": \"/dev/loop933\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 934,\n \"path\": \"/dev/loop934\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 935,\n \"path\": \"/dev/loop935\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 936,\n \"path\": \"/dev/loop936\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 937,\n \"path\": \"/dev/loop937\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 938,\n \"path\": \"/dev/loop938\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 939,\n \"path\": \"/dev/loop939\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 940,\n \"path\": \"/dev/loop940\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 941,\n \"path\": \"/dev/loop941\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 942,\n \"path\": \"/dev/loop942\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 943,\n \"path\": \"/dev/loop943\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 944,\n \"path\": \"/dev/loop944\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 945,\n \"path\": \"/dev/loop945\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 946,\n \"path\": \"/dev/loop946\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 947,\n \"path\": \"/dev/loop947\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 948,\n \"path\": \"/dev/loop948\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 949,\n \"path\": \"/dev/loop949\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 950,\n \"path\": \"/dev/loop950\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 951,\n \"path\": \"/dev/loop951\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 952,\n \"path\": \"/dev/loop952\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 953,\n \"path\": \"/dev/loop953\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 954,\n \"path\": \"/dev/loop954\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 955,\n \"path\": \"/dev/loop955\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 956,\n \"path\": \"/dev/loop956\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 957,\n \"path\": \"/dev/loop957\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 958,\n \"path\": \"/dev/loop958\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 959,\n \"path\": \"/dev/loop959\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 960,\n \"path\": \"/dev/loop960\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 961,\n \"path\": \"/dev/loop961\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 962,\n \"path\": \"/dev/loop962\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 963,\n \"path\": \"/dev/loop963\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 964,\n \"path\": \"/dev/loop964\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 965,\n \"path\": \"/dev/loop965\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 966,\n \"path\": \"/dev/loop966\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 967,\n \"path\": \"/dev/loop967\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 968,\n \"path\": \"/dev/loop968\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 969,\n \"path\": \"/dev/loop969\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 970,\n \"path\": \"/dev/loop970\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 971,\n \"path\": \"/dev/loop971\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 972,\n \"path\": \"/dev/loop972\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 973,\n \"path\": \"/dev/loop973\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 974,\n \"path\": \"/dev/loop974\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 975,\n \"path\": \"/dev/loop975\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 976,\n \"path\": \"/dev/loop976\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 977,\n \"path\": \"/dev/loop977\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 978,\n \"path\": \"/dev/loop978\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 979,\n \"path\": \"/dev/loop979\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 980,\n \"path\": \"/dev/loop980\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 981,\n \"path\": \"/dev/loop981\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 982,\n \"path\": \"/dev/loop982\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 983,\n \"path\": \"/dev/loop983\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 984,\n \"path\": \"/dev/loop984\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 985,\n \"path\": \"/dev/loop985\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 986,\n \"path\": \"/dev/loop986\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 987,\n \"path\": \"/dev/loop987\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 988,\n \"path\": \"/dev/loop988\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 989,\n \"path\": \"/dev/loop989\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 990,\n \"path\": \"/dev/loop990\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 991,\n \"path\": \"/dev/loop991\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 992,\n \"path\": \"/dev/loop992\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 993,\n \"path\": \"/dev/loop993\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 994,\n \"path\": \"/dev/loop994\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 995,\n \"path\": \"/dev/loop995\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 996,\n \"path\": \"/dev/loop996\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 997,\n \"path\": \"/dev/loop997\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 998,\n \"path\": \"/dev/loop998\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 999,\n \"path\": \"/dev/loop999\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"path\": \"/proc/989978/ns/pid\",\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/989978/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/989978/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/989978/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/proc\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/host\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/run/systemd/\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/run/systemd\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/containers/cluster-tools/fc1c432d\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/volumes/kubernetes.io~projected/kube-api-access-ztvd2\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v131-worker\",\n \"CRI_VERSION=v1.32.0\",\n \"RUNC_VERSION=v1.2.6\",\n \"NCTL_VERSION=2.0.4\",\n \"CTR_VERSION=2.0.4\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe\",\n \"snapshotKey\": \"d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-19T23:12:54.602243779Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/lfncnti/cluster-tools:v1.0.8\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-n9lh4\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"de1da172-4054-4a52-a719-d1d625a68358\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_cluster-tools-n9lh4_de1da172-4054-4a52-a719-d1d625a68358/cluster-tools/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/run/systemd/\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/systemd\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/proc\",\n \"gidMappings\": [],\n \"hostPath\": \"/proc\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/host\",\n \"gidMappings\": [],\n \"hostPath\": \"/\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/volumes/kubernetes.io~projected/kube-api-access-ztvd2\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/containers/cluster-tools/fc1c432d\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:12:54.968820324Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:48Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:48Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:48] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "envs": [ { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" } ], "image": { "image": "sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f", "user_specified_image": "lfncnti/cluster-tools:v1.0.8" }, "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-n9lh4", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "de1da172-4054-4a52-a719-d1d625a68358" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 2 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "cluster-tools/0.log", "metadata": { "name": "cluster-tools" }, "mounts": [ { "container_path": "/run/systemd/", "host_path": "/run/systemd", "readonly": true }, { "container_path": "/proc", "host_path": "/proc" }, { "container_path": "/host", "host_path": "/" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/volumes/kubernetes.io~projected/kube-api-access-ztvd2", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/containers/cluster-tools/fc1c432d" } ] }, "pid": 990003, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "cluster-tools", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "lfncnti/cluster-tools:v1.0.8", "io.kubernetes.cri.sandbox-id": "02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe", "io.kubernetes.cri.sandbox-name": "cluster-tools-n9lh4", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "de1da172-4054-4a52-a719-d1d625a68358" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-podde1da172_4054_4a52_a719_d1d625a68358.slice:cri-containerd:d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 1000, "path": "/dev/loop1000", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 128, "path": "/dev/loop128", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 129, "path": "/dev/loop129", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 130, "path": "/dev/loop130", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 131, "path": "/dev/loop131", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 132, "path": "/dev/loop132", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 133, "path": "/dev/loop133", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 134, "path": "/dev/loop134", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 135, "path": "/dev/loop135", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 136, "path": "/dev/loop136", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 137, "path": "/dev/loop137", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 138, "path": "/dev/loop138", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 139, "path": "/dev/loop139", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 140, "path": "/dev/loop140", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 141, "path": "/dev/loop141", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 142, "path": "/dev/loop142", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 143, "path": "/dev/loop143", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 144, "path": "/dev/loop144", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 145, "path": "/dev/loop145", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 146, "path": "/dev/loop146", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 147, "path": "/dev/loop147", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 148, "path": "/dev/loop148", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 149, "path": "/dev/loop149", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 150, "path": "/dev/loop150", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 151, "path": "/dev/loop151", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 152, "path": "/dev/loop152", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 153, "path": "/dev/loop153", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 154, "path": "/dev/loop154", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 155, "path": "/dev/loop155", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 156, "path": "/dev/loop156", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 157, "path": "/dev/loop157", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 158, "path": "/dev/loop158", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 159, "path": "/dev/loop159", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 160, "path": "/dev/loop160", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 161, "path": "/dev/loop161", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 162, "path": "/dev/loop162", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 163, "path": "/dev/loop163", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 164, "path": "/dev/loop164", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 165, "path": "/dev/loop165", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 166, "path": "/dev/loop166", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 167, "path": "/dev/loop167", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 168, "path": "/dev/loop168", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 169, "path": "/dev/loop169", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 170, "path": "/dev/loop170", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 171, "path": "/dev/loop171", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 172, "path": "/dev/loop172", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 173, "path": "/dev/loop173", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 174, "path": "/dev/loop174", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 175, "path": "/dev/loop175", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 176, "path": "/dev/loop176", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 177, "path": "/dev/loop177", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 178, "path": "/dev/loop178", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 179, "path": "/dev/loop179", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 180, "path": "/dev/loop180", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 181, "path": "/dev/loop181", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 182, "path": "/dev/loop182", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 183, "path": "/dev/loop183", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 184, "path": "/dev/loop184", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 185, "path": "/dev/loop185", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 186, "path": "/dev/loop186", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 187, "path": "/dev/loop187", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 188, "path": "/dev/loop188", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 189, "path": "/dev/loop189", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 190, "path": "/dev/loop190", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 191, "path": "/dev/loop191", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 192, "path": "/dev/loop192", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 193, "path": "/dev/loop193", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 194, "path": "/dev/loop194", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 195, "path": "/dev/loop195", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 196, "path": "/dev/loop196", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 197, "path": "/dev/loop197", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 198, "path": "/dev/loop198", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 199, "path": "/dev/loop199", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 200, "path": "/dev/loop200", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 201, "path": "/dev/loop201", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 202, "path": "/dev/loop202", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 203, "path": "/dev/loop203", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 204, "path": "/dev/loop204", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 205, "path": "/dev/loop205", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 206, "path": "/dev/loop206", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 207, "path": "/dev/loop207", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 208, "path": "/dev/loop208", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 209, "path": "/dev/loop209", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 210, "path": "/dev/loop210", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 211, "path": "/dev/loop211", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 212, "path": "/dev/loop212", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 213, "path": "/dev/loop213", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 214, "path": "/dev/loop214", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 215, "path": "/dev/loop215", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 216, "path": "/dev/loop216", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 217, "path": "/dev/loop217", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 218, "path": "/dev/loop218", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 219, "path": "/dev/loop219", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 220, "path": "/dev/loop220", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 221, "path": "/dev/loop221", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 222, "path": "/dev/loop222", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 223, "path": "/dev/loop223", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 224, "path": "/dev/loop224", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 225, "path": "/dev/loop225", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 226, "path": "/dev/loop226", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 227, "path": "/dev/loop227", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 228, "path": "/dev/loop228", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 229, "path": "/dev/loop229", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 230, "path": "/dev/loop230", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 231, "path": "/dev/loop231", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 232, "path": "/dev/loop232", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 233, "path": "/dev/loop233", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 234, "path": "/dev/loop234", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 235, "path": "/dev/loop235", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 236, "path": "/dev/loop236", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 237, "path": "/dev/loop237", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 238, "path": "/dev/loop238", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 239, "path": "/dev/loop239", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 240, "path": "/dev/loop240", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 241, "path": "/dev/loop241", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 242, "path": "/dev/loop242", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 243, "path": "/dev/loop243", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 244, "path": "/dev/loop244", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 245, "path": "/dev/loop245", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 246, "path": "/dev/loop246", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 247, "path": "/dev/loop247", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 248, "path": "/dev/loop248", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 249, "path": "/dev/loop249", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 250, "path": "/dev/loop250", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 251, "path": "/dev/loop251", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 252, "path": "/dev/loop252", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 253, "path": "/dev/loop253", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 254, "path": "/dev/loop254", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 255, "path": "/dev/loop255", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 256, "path": "/dev/loop256", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 257, "path": "/dev/loop257", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 258, "path": "/dev/loop258", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 259, "path": "/dev/loop259", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 260, "path": "/dev/loop260", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 261, "path": "/dev/loop261", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 262, "path": "/dev/loop262", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 263, "path": "/dev/loop263", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 264, "path": "/dev/loop264", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 265, "path": "/dev/loop265", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 266, "path": "/dev/loop266", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 267, "path": "/dev/loop267", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 268, "path": "/dev/loop268", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 269, "path": "/dev/loop269", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 270, "path": "/dev/loop270", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 271, "path": "/dev/loop271", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 272, "path": "/dev/loop272", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 273, "path": "/dev/loop273", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 274, "path": "/dev/loop274", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 275, "path": "/dev/loop275", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 276, "path": "/dev/loop276", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 277, "path": "/dev/loop277", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 278, "path": "/dev/loop278", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 279, "path": "/dev/loop279", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 280, "path": "/dev/loop280", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 281, "path": "/dev/loop281", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 282, "path": "/dev/loop282", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 283, "path": "/dev/loop283", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 284, "path": "/dev/loop284", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 285, "path": "/dev/loop285", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 286, "path": "/dev/loop286", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 287, "path": "/dev/loop287", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 288, "path": "/dev/loop288", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 289, "path": "/dev/loop289", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 290, "path": "/dev/loop290", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 291, "path": "/dev/loop291", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 292, "path": "/dev/loop292", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 293, "path": "/dev/loop293", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 294, "path": "/dev/loop294", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 295, "path": "/dev/loop295", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 296, "path": "/dev/loop296", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 297, "path": "/dev/loop297", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 298, "path": "/dev/loop298", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 299, "path": "/dev/loop299", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 300, "path": "/dev/loop300", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 301, "path": "/dev/loop301", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 302, "path": "/dev/loop302", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 303, "path": "/dev/loop303", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 304, "path": "/dev/loop304", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 305, "path": "/dev/loop305", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 306, "path": "/dev/loop306", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 307, "path": "/dev/loop307", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 308, "path": "/dev/loop308", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 309, "path": "/dev/loop309", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 310, "path": "/dev/loop310", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 311, "path": "/dev/loop311", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 312, "path": "/dev/loop312", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 313, "path": "/dev/loop313", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 314, "path": "/dev/loop314", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 315, "path": "/dev/loop315", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 316, "path": "/dev/loop316", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 317, "path": "/dev/loop317", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 318, "path": "/dev/loop318", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 319, "path": "/dev/loop319", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 320, "path": "/dev/loop320", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 321, "path": "/dev/loop321", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 322, "path": "/dev/loop322", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 323, "path": "/dev/loop323", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 324, "path": "/dev/loop324", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 325, "path": "/dev/loop325", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 326, "path": "/dev/loop326", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 327, "path": "/dev/loop327", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 328, "path": "/dev/loop328", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 329, "path": "/dev/loop329", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 330, "path": "/dev/loop330", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 331, "path": "/dev/loop331", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 332, "path": "/dev/loop332", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 333, "path": "/dev/loop333", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 334, "path": "/dev/loop334", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 335, "path": "/dev/loop335", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 336, "path": "/dev/loop336", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 337, "path": "/dev/loop337", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 338, "path": "/dev/loop338", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 339, "path": "/dev/loop339", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 340, "path": "/dev/loop340", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 341, "path": "/dev/loop341", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 342, "path": "/dev/loop342", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 343, "path": "/dev/loop343", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 344, "path": "/dev/loop344", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 345, "path": "/dev/loop345", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 346, "path": "/dev/loop346", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 347, "path": "/dev/loop347", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 348, "path": "/dev/loop348", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 349, "path": "/dev/loop349", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 350, "path": "/dev/loop350", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 351, "path": "/dev/loop351", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 352, "path": "/dev/loop352", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 353, "path": "/dev/loop353", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 354, "path": "/dev/loop354", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 355, "path": "/dev/loop355", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 356, "path": "/dev/loop356", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 357, "path": "/dev/loop357", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 358, "path": "/dev/loop358", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 359, "path": "/dev/loop359", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 360, "path": "/dev/loop360", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 361, "path": "/dev/loop361", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 362, "path": "/dev/loop362", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 363, "path": "/dev/loop363", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 364, "path": "/dev/loop364", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 365, "path": "/dev/loop365", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 366, "path": "/dev/loop366", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 367, "path": "/dev/loop367", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 368, "path": "/dev/loop368", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 369, "path": "/dev/loop369", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 370, "path": "/dev/loop370", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 371, "path": "/dev/loop371", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 372, "path": "/dev/loop372", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 373, "path": "/dev/loop373", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 374, "path": "/dev/loop374", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 375, "path": "/dev/loop375", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 376, "path": "/dev/loop376", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 377, "path": "/dev/loop377", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 378, "path": "/dev/loop378", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 379, "path": "/dev/loop379", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 380, "path": "/dev/loop380", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 381, "path": "/dev/loop381", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 382, "path": "/dev/loop382", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 383, "path": "/dev/loop383", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 384, "path": "/dev/loop384", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 385, "path": "/dev/loop385", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 386, "path": "/dev/loop386", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 387, "path": "/dev/loop387", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 388, "path": "/dev/loop388", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 389, "path": "/dev/loop389", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 390, "path": "/dev/loop390", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 391, "path": "/dev/loop391", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 392, "path": "/dev/loop392", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 393, "path": "/dev/loop393", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 394, "path": "/dev/loop394", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 395, "path": "/dev/loop395", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 396, "path": "/dev/loop396", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 397, "path": "/dev/loop397", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 398, "path": "/dev/loop398", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 399, "path": "/dev/loop399", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 400, "path": "/dev/loop400", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 401, "path": "/dev/loop401", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 402, "path": "/dev/loop402", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 403, "path": "/dev/loop403", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 404, "path": "/dev/loop404", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 405, "path": "/dev/loop405", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 406, "path": "/dev/loop406", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 407, "path": "/dev/loop407", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 408, "path": "/dev/loop408", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 409, "path": "/dev/loop409", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 410, "path": "/dev/loop410", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 411, "path": "/dev/loop411", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 412, "path": "/dev/loop412", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 413, "path": "/dev/loop413", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 414, "path": "/dev/loop414", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 415, "path": "/dev/loop415", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 416, "path": "/dev/loop416", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 417, "path": "/dev/loop417", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 418, "path": "/dev/loop418", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 419, "path": "/dev/loop419", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 420, "path": "/dev/loop420", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 421, "path": "/dev/loop421", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 422, "path": "/dev/loop422", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 423, "path": "/dev/loop423", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 424, "path": "/dev/loop424", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 425, "path": "/dev/loop425", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 426, "path": "/dev/loop426", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 427, "path": "/dev/loop427", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 428, "path": "/dev/loop428", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 429, "path": "/dev/loop429", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 430, "path": "/dev/loop430", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 431, "path": "/dev/loop431", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 432, "path": "/dev/loop432", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 433, "path": "/dev/loop433", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 434, "path": "/dev/loop434", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 435, "path": "/dev/loop435", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 436, "path": "/dev/loop436", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 437, "path": "/dev/loop437", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 438, "path": "/dev/loop438", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 439, "path": "/dev/loop439", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 440, "path": "/dev/loop440", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 441, "path": "/dev/loop441", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 442, "path": "/dev/loop442", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 443, "path": "/dev/loop443", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 444, "path": "/dev/loop444", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 445, "path": "/dev/loop445", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 446, "path": "/dev/loop446", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 447, "path": "/dev/loop447", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 448, "path": "/dev/loop448", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 449, "path": "/dev/loop449", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 450, "path": "/dev/loop450", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 451, "path": "/dev/loop451", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 452, "path": "/dev/loop452", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 453, "path": "/dev/loop453", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 454, "path": "/dev/loop454", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 455, "path": "/dev/loop455", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 456, "path": "/dev/loop456", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 457, "path": "/dev/loop457", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 458, "path": "/dev/loop458", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 459, "path": "/dev/loop459", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 460, "path": "/dev/loop460", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 461, "path": "/dev/loop461", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 462, "path": "/dev/loop462", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 463, "path": "/dev/loop463", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 464, "path": "/dev/loop464", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 465, "path": "/dev/loop465", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 466, "path": "/dev/loop466", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 467, "path": "/dev/loop467", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 468, "path": "/dev/loop468", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 469, "path": "/dev/loop469", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 470, "path": "/dev/loop470", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 471, "path": "/dev/loop471", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 472, "path": "/dev/loop472", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 473, "path": "/dev/loop473", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 474, "path": "/dev/loop474", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 475, "path": "/dev/loop475", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 476, "path": "/dev/loop476", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 477, "path": "/dev/loop477", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 478, "path": "/dev/loop478", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 479, "path": "/dev/loop479", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 480, "path": "/dev/loop480", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 481, "path": "/dev/loop481", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 482, "path": "/dev/loop482", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 483, "path": "/dev/loop483", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 484, "path": "/dev/loop484", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 485, "path": "/dev/loop485", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 486, "path": "/dev/loop486", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 487, "path": "/dev/loop487", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 488, "path": "/dev/loop488", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 489, "path": "/dev/loop489", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 490, "path": "/dev/loop490", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 491, "path": "/dev/loop491", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 492, "path": "/dev/loop492", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 493, "path": "/dev/loop493", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 494, "path": "/dev/loop494", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 495, "path": "/dev/loop495", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 496, "path": "/dev/loop496", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 497, "path": "/dev/loop497", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 498, "path": "/dev/loop498", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 499, "path": "/dev/loop499", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 500, "path": "/dev/loop500", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 501, "path": "/dev/loop501", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 502, "path": "/dev/loop502", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 503, "path": "/dev/loop503", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 504, "path": "/dev/loop504", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 505, "path": "/dev/loop505", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 506, "path": "/dev/loop506", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 507, "path": "/dev/loop507", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 508, "path": "/dev/loop508", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 509, "path": "/dev/loop509", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 510, "path": "/dev/loop510", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 511, "path": "/dev/loop511", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 512, "path": "/dev/loop512", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 513, "path": "/dev/loop513", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 514, "path": "/dev/loop514", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 515, "path": "/dev/loop515", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 516, "path": "/dev/loop516", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 517, "path": "/dev/loop517", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 518, "path": "/dev/loop518", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 519, "path": "/dev/loop519", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 520, "path": "/dev/loop520", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 521, "path": "/dev/loop521", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 522, "path": "/dev/loop522", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 523, "path": "/dev/loop523", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 524, "path": "/dev/loop524", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 525, "path": "/dev/loop525", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 526, "path": "/dev/loop526", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 527, "path": "/dev/loop527", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 528, "path": "/dev/loop528", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 529, "path": "/dev/loop529", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 530, "path": "/dev/loop530", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 531, "path": "/dev/loop531", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 532, "path": "/dev/loop532", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 533, "path": "/dev/loop533", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 534, "path": "/dev/loop534", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 535, "path": "/dev/loop535", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 536, "path": "/dev/loop536", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 537, "path": "/dev/loop537", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 538, "path": "/dev/loop538", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 539, "path": "/dev/loop539", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 540, "path": "/dev/loop540", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 541, "path": "/dev/loop541", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 542, "path": "/dev/loop542", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 543, "path": "/dev/loop543", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 544, "path": "/dev/loop544", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 545, "path": "/dev/loop545", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 546, "path": "/dev/loop546", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 547, "path": "/dev/loop547", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 548, "path": "/dev/loop548", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 549, "path": "/dev/loop549", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 550, "path": "/dev/loop550", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 551, "path": "/dev/loop551", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 552, "path": "/dev/loop552", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 553, "path": "/dev/loop553", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 554, "path": "/dev/loop554", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 555, "path": "/dev/loop555", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 556, "path": "/dev/loop556", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 557, "path": "/dev/loop557", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 558, "path": "/dev/loop558", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 559, "path": "/dev/loop559", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 560, "path": "/dev/loop560", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 561, "path": "/dev/loop561", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 562, "path": "/dev/loop562", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 563, "path": "/dev/loop563", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 564, "path": "/dev/loop564", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 565, "path": "/dev/loop565", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 566, "path": "/dev/loop566", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 567, "path": "/dev/loop567", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 568, "path": "/dev/loop568", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 569, "path": "/dev/loop569", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 570, "path": "/dev/loop570", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 571, "path": "/dev/loop571", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 572, "path": "/dev/loop572", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 573, "path": "/dev/loop573", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 574, "path": "/dev/loop574", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 575, "path": "/dev/loop575", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 576, "path": "/dev/loop576", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 577, "path": "/dev/loop577", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 578, "path": "/dev/loop578", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 579, "path": "/dev/loop579", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 580, "path": "/dev/loop580", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 581, "path": "/dev/loop581", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 582, "path": "/dev/loop582", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 583, "path": "/dev/loop583", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 584, "path": "/dev/loop584", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 585, "path": "/dev/loop585", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 586, "path": "/dev/loop586", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 587, "path": "/dev/loop587", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 588, "path": "/dev/loop588", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 589, "path": "/dev/loop589", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 590, "path": "/dev/loop590", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 591, "path": "/dev/loop591", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 592, "path": "/dev/loop592", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 593, "path": "/dev/loop593", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 594, "path": "/dev/loop594", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 595, "path": "/dev/loop595", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 596, "path": "/dev/loop596", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 597, "path": "/dev/loop597", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 598, "path": "/dev/loop598", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 599, "path": "/dev/loop599", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 600, "path": "/dev/loop600", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 601, "path": "/dev/loop601", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 602, "path": "/dev/loop602", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 603, "path": "/dev/loop603", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 604, "path": "/dev/loop604", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 605, "path": "/dev/loop605", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 606, "path": "/dev/loop606", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 607, "path": "/dev/loop607", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 608, "path": "/dev/loop608", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 609, "path": "/dev/loop609", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 610, "path": "/dev/loop610", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 611, "path": "/dev/loop611", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 612, "path": "/dev/loop612", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 613, "path": "/dev/loop613", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 614, "path": "/dev/loop614", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 615, "path": "/dev/loop615", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 616, "path": "/dev/loop616", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 617, "path": "/dev/loop617", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 618, "path": "/dev/loop618", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 619, "path": "/dev/loop619", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 620, "path": "/dev/loop620", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 621, "path": "/dev/loop621", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 622, "path": "/dev/loop622", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 623, "path": "/dev/loop623", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 624, "path": "/dev/loop624", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 625, "path": "/dev/loop625", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 626, "path": "/dev/loop626", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 627, "path": "/dev/loop627", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 628, "path": "/dev/loop628", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 629, "path": "/dev/loop629", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 630, "path": "/dev/loop630", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 631, "path": "/dev/loop631", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 632, "path": "/dev/loop632", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 633, "path": "/dev/loop633", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 634, "path": "/dev/loop634", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 635, "path": "/dev/loop635", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 636, "path": "/dev/loop636", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 637, "path": "/dev/loop637", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 638, "path": "/dev/loop638", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 639, "path": "/dev/loop639", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 640, "path": "/dev/loop640", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 641, "path": "/dev/loop641", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 642, "path": "/dev/loop642", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 643, "path": "/dev/loop643", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 644, "path": "/dev/loop644", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 645, "path": "/dev/loop645", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 646, "path": "/dev/loop646", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 647, "path": "/dev/loop647", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 648, "path": "/dev/loop648", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 649, "path": "/dev/loop649", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 650, "path": "/dev/loop650", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 651, "path": "/dev/loop651", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 652, "path": "/dev/loop652", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 653, "path": "/dev/loop653", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 654, "path": "/dev/loop654", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 655, "path": "/dev/loop655", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 656, "path": "/dev/loop656", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 657, "path": "/dev/loop657", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 658, "path": "/dev/loop658", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 659, "path": "/dev/loop659", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 660, "path": "/dev/loop660", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 661, "path": "/dev/loop661", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 662, "path": "/dev/loop662", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 663, "path": "/dev/loop663", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 664, "path": "/dev/loop664", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 665, "path": "/dev/loop665", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 666, "path": "/dev/loop666", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 667, "path": "/dev/loop667", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 668, "path": "/dev/loop668", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 669, "path": "/dev/loop669", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 670, "path": "/dev/loop670", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 671, "path": "/dev/loop671", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 672, "path": "/dev/loop672", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 673, "path": "/dev/loop673", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 674, "path": "/dev/loop674", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 675, "path": "/dev/loop675", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 676, "path": "/dev/loop676", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 677, "path": "/dev/loop677", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 678, "path": "/dev/loop678", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 679, "path": "/dev/loop679", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 680, "path": "/dev/loop680", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 681, "path": "/dev/loop681", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 682, "path": "/dev/loop682", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 683, "path": "/dev/loop683", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 684, "path": "/dev/loop684", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 685, "path": "/dev/loop685", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 686, "path": "/dev/loop686", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 687, "path": "/dev/loop687", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 688, "path": "/dev/loop688", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 689, "path": "/dev/loop689", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 690, "path": "/dev/loop690", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 691, "path": "/dev/loop691", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 692, "path": "/dev/loop692", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 693, "path": "/dev/loop693", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 694, "path": "/dev/loop694", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 695, "path": "/dev/loop695", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 696, "path": "/dev/loop696", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 697, "path": "/dev/loop697", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 698, "path": "/dev/loop698", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 699, "path": "/dev/loop699", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 700, "path": "/dev/loop700", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 701, "path": "/dev/loop701", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 702, "path": "/dev/loop702", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 703, "path": "/dev/loop703", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 704, "path": "/dev/loop704", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 705, "path": "/dev/loop705", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 706, "path": "/dev/loop706", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 707, "path": "/dev/loop707", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 708, "path": "/dev/loop708", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 709, "path": "/dev/loop709", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 710, "path": "/dev/loop710", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 711, "path": "/dev/loop711", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 712, "path": "/dev/loop712", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 713, "path": "/dev/loop713", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 714, "path": "/dev/loop714", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 715, "path": "/dev/loop715", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 716, "path": "/dev/loop716", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 717, "path": "/dev/loop717", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 718, "path": "/dev/loop718", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 719, "path": "/dev/loop719", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 720, "path": "/dev/loop720", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 721, "path": "/dev/loop721", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 722, "path": "/dev/loop722", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 723, "path": "/dev/loop723", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 724, "path": "/dev/loop724", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 725, "path": "/dev/loop725", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 726, "path": "/dev/loop726", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 727, "path": "/dev/loop727", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 728, "path": "/dev/loop728", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 729, "path": "/dev/loop729", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 730, "path": "/dev/loop730", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 731, "path": "/dev/loop731", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 732, "path": "/dev/loop732", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 733, "path": "/dev/loop733", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 734, "path": "/dev/loop734", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 735, "path": "/dev/loop735", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 736, "path": "/dev/loop736", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 737, "path": "/dev/loop737", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 738, "path": "/dev/loop738", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 739, "path": "/dev/loop739", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 740, "path": "/dev/loop740", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 741, "path": "/dev/loop741", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 742, "path": "/dev/loop742", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 743, "path": "/dev/loop743", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 744, "path": "/dev/loop744", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 745, "path": "/dev/loop745", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 746, "path": "/dev/loop746", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 747, "path": "/dev/loop747", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 748, "path": "/dev/loop748", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 749, "path": "/dev/loop749", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 750, "path": "/dev/loop750", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 751, "path": "/dev/loop751", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 752, "path": "/dev/loop752", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 753, "path": "/dev/loop753", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 754, "path": "/dev/loop754", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 755, "path": "/dev/loop755", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 756, "path": "/dev/loop756", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 757, "path": "/dev/loop757", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 758, "path": "/dev/loop758", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 759, "path": "/dev/loop759", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 760, "path": "/dev/loop760", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 761, "path": "/dev/loop761", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 762, "path": "/dev/loop762", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 763, "path": "/dev/loop763", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 764, "path": "/dev/loop764", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 765, "path": "/dev/loop765", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 766, "path": "/dev/loop766", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 767, "path": "/dev/loop767", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 768, "path": "/dev/loop768", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 769, "path": "/dev/loop769", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 770, "path": "/dev/loop770", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 771, "path": "/dev/loop771", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 772, "path": "/dev/loop772", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 773, "path": "/dev/loop773", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 774, "path": "/dev/loop774", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 775, "path": "/dev/loop775", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 776, "path": "/dev/loop776", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 777, "path": "/dev/loop777", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 778, "path": "/dev/loop778", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 779, "path": "/dev/loop779", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 780, "path": "/dev/loop780", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 781, "path": "/dev/loop781", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 782, "path": "/dev/loop782", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 783, "path": "/dev/loop783", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 784, "path": "/dev/loop784", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 785, "path": "/dev/loop785", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 786, "path": "/dev/loop786", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 787, "path": "/dev/loop787", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 788, "path": "/dev/loop788", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 789, "path": "/dev/loop789", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 790, "path": "/dev/loop790", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 791, "path": "/dev/loop791", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 792, "path": "/dev/loop792", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 793, "path": "/dev/loop793", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 794, "path": "/dev/loop794", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 795, "path": "/dev/loop795", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 796, "path": "/dev/loop796", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 797, "path": "/dev/loop797", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 798, "path": "/dev/loop798", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 799, "path": "/dev/loop799", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 800, "path": "/dev/loop800", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 801, "path": "/dev/loop801", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 802, "path": "/dev/loop802", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 803, "path": "/dev/loop803", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 804, "path": "/dev/loop804", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 805, "path": "/dev/loop805", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 806, "path": "/dev/loop806", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 807, "path": "/dev/loop807", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 808, "path": "/dev/loop808", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 809, "path": "/dev/loop809", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 810, "path": "/dev/loop810", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 811, "path": "/dev/loop811", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 812, "path": "/dev/loop812", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 813, "path": "/dev/loop813", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 814, "path": "/dev/loop814", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 815, "path": "/dev/loop815", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 816, "path": "/dev/loop816", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 817, "path": "/dev/loop817", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 818, "path": "/dev/loop818", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 819, "path": "/dev/loop819", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 820, "path": "/dev/loop820", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 821, "path": "/dev/loop821", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 822, "path": "/dev/loop822", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 823, "path": "/dev/loop823", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 824, "path": "/dev/loop824", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 825, "path": "/dev/loop825", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 826, "path": "/dev/loop826", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 827, "path": "/dev/loop827", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 828, "path": "/dev/loop828", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 829, "path": "/dev/loop829", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 830, "path": "/dev/loop830", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 831, "path": "/dev/loop831", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 832, "path": "/dev/loop832", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 833, "path": "/dev/loop833", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 834, "path": "/dev/loop834", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 835, "path": "/dev/loop835", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 836, "path": "/dev/loop836", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 837, "path": "/dev/loop837", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 838, "path": "/dev/loop838", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 839, "path": "/dev/loop839", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 840, "path": "/dev/loop840", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 841, "path": "/dev/loop841", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 842, "path": "/dev/loop842", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 843, "path": "/dev/loop843", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 844, "path": "/dev/loop844", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 845, "path": "/dev/loop845", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 846, "path": "/dev/loop846", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 847, "path": "/dev/loop847", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 848, "path": "/dev/loop848", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 849, "path": "/dev/loop849", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 850, "path": "/dev/loop850", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 851, "path": "/dev/loop851", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 852, "path": "/dev/loop852", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 853, "path": "/dev/loop853", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 854, "path": "/dev/loop854", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 855, "path": "/dev/loop855", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 856, "path": "/dev/loop856", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 857, "path": "/dev/loop857", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 858, "path": "/dev/loop858", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 859, "path": "/dev/loop859", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 860, "path": "/dev/loop860", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 861, "path": "/dev/loop861", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 862, "path": "/dev/loop862", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 863, "path": "/dev/loop863", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 864, "path": "/dev/loop864", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 865, "path": "/dev/loop865", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 866, "path": "/dev/loop866", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 867, "path": "/dev/loop867", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 868, "path": "/dev/loop868", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 869, "path": "/dev/loop869", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 870, "path": "/dev/loop870", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 871, "path": "/dev/loop871", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 872, "path": "/dev/loop872", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 873, "path": "/dev/loop873", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 874, "path": "/dev/loop874", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 875, "path": "/dev/loop875", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 876, "path": "/dev/loop876", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 877, "path": "/dev/loop877", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 878, "path": "/dev/loop878", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 879, "path": "/dev/loop879", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 880, "path": "/dev/loop880", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 881, "path": "/dev/loop881", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 882, "path": "/dev/loop882", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 883, "path": "/dev/loop883", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 884, "path": "/dev/loop884", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 885, "path": "/dev/loop885", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 886, "path": "/dev/loop886", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 887, "path": "/dev/loop887", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 888, "path": "/dev/loop888", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 889, "path": "/dev/loop889", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 890, "path": "/dev/loop890", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 891, "path": "/dev/loop891", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 892, "path": "/dev/loop892", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 893, "path": "/dev/loop893", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 894, "path": "/dev/loop894", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 895, "path": "/dev/loop895", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 896, "path": "/dev/loop896", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 897, "path": "/dev/loop897", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 898, "path": "/dev/loop898", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 899, "path": "/dev/loop899", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 900, "path": "/dev/loop900", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 901, "path": "/dev/loop901", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 902, "path": "/dev/loop902", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 903, "path": "/dev/loop903", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 904, "path": "/dev/loop904", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 905, "path": "/dev/loop905", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 906, "path": "/dev/loop906", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 907, "path": "/dev/loop907", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 908, "path": "/dev/loop908", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 909, "path": "/dev/loop909", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 910, "path": "/dev/loop910", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 911, "path": "/dev/loop911", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 912, "path": "/dev/loop912", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 913, "path": "/dev/loop913", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 914, "path": "/dev/loop914", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 915, "path": "/dev/loop915", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 916, "path": "/dev/loop916", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 917, "path": "/dev/loop917", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 918, "path": "/dev/loop918", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 919, "path": "/dev/loop919", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 920, "path": "/dev/loop920", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 921, "path": "/dev/loop921", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 922, "path": "/dev/loop922", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 923, "path": "/dev/loop923", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 924, "path": "/dev/loop924", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 925, "path": "/dev/loop925", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 926, "path": "/dev/loop926", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 927, "path": "/dev/loop927", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 928, "path": "/dev/loop928", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 929, "path": "/dev/loop929", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 930, "path": "/dev/loop930", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 931, "path": "/dev/loop931", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 932, "path": "/dev/loop932", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 933, "path": "/dev/loop933", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 934, "path": "/dev/loop934", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 935, "path": "/dev/loop935", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 936, "path": "/dev/loop936", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 937, "path": "/dev/loop937", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 938, "path": "/dev/loop938", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 939, "path": "/dev/loop939", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 940, "path": "/dev/loop940", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 941, "path": "/dev/loop941", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 942, "path": "/dev/loop942", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 943, "path": "/dev/loop943", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 944, "path": "/dev/loop944", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 945, "path": "/dev/loop945", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 946, "path": "/dev/loop946", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 947, "path": "/dev/loop947", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 948, "path": "/dev/loop948", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 949, "path": "/dev/loop949", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 950, "path": "/dev/loop950", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 951, "path": "/dev/loop951", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 952, "path": "/dev/loop952", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 953, "path": "/dev/loop953", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 954, "path": "/dev/loop954", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 955, "path": "/dev/loop955", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 956, "path": "/dev/loop956", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 957, "path": "/dev/loop957", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 958, "path": "/dev/loop958", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 959, "path": "/dev/loop959", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 960, "path": "/dev/loop960", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 961, "path": "/dev/loop961", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 962, "path": "/dev/loop962", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 963, "path": "/dev/loop963", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 964, "path": "/dev/loop964", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 965, "path": "/dev/loop965", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 966, "path": "/dev/loop966", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 967, "path": "/dev/loop967", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 968, "path": "/dev/loop968", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 969, "path": "/dev/loop969", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 970, "path": "/dev/loop970", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 971, "path": "/dev/loop971", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 972, "path": "/dev/loop972", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 973, "path": "/dev/loop973", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 974, "path": "/dev/loop974", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 975, "path": "/dev/loop975", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 976, "path": "/dev/loop976", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 977, "path": "/dev/loop977", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 978, "path": "/dev/loop978", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 979, "path": "/dev/loop979", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 980, "path": "/dev/loop980", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 981, "path": "/dev/loop981", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 982, "path": "/dev/loop982", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 983, "path": "/dev/loop983", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 984, "path": "/dev/loop984", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 985, "path": "/dev/loop985", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 986, "path": "/dev/loop986", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 987, "path": "/dev/loop987", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 988, "path": "/dev/loop988", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 989, "path": "/dev/loop989", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 990, "path": "/dev/loop990", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 991, "path": "/dev/loop991", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 992, "path": "/dev/loop992", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 993, "path": "/dev/loop993", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 994, "path": "/dev/loop994", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 995, "path": "/dev/loop995", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 996, "path": "/dev/loop996", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 997, "path": "/dev/loop997", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 998, "path": "/dev/loop998", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 999, "path": "/dev/loop999", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "path": "/proc/989978/ns/pid", "type": "pid" }, { "path": "/proc/989978/ns/ipc", "type": "ipc" }, { "path": "/proc/989978/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/989978/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/proc", "options": [ "rbind", "rprivate", "rw" ], "source": "/proc", "type": "bind" }, { "destination": "/host", "options": [ "rbind", "rprivate", "rw" ], "source": "/", "type": "bind" }, { "destination": "/run/systemd/", "options": [ "rbind", "rprivate", "ro" ], "source": "/run/systemd", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/containers/cluster-tools/fc1c432d", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/volumes/kubernetes.io~projected/kube-api-access-ztvd2", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v131-worker", "CRI_VERSION=v1.32.0", "RUNC_VERSION=v1.2.6", "NCTL_VERSION=2.0.4", "CTR_VERSION=2.0.4", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "02e51e7e8e62eb456fa3531e69a80e7c2440a40282d2f7f4ab9476ceca788ffe", "snapshotKey": "d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-19T23:12:54.602243779Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "d6759c0d4048bd560ea14f05f6b921bf0189bbc85d6f7a4f75bc69622d4dfc27", "image": { "annotations": {}, "image": "docker.io/lfncnti/cluster-tools:v1.0.8", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-n9lh4", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "de1da172-4054-4a52-a719-d1d625a68358" }, "logPath": "/var/log/pods/cnf-testsuite_cluster-tools-n9lh4_de1da172-4054-4a52-a719-d1d625a68358/cluster-tools/0.log", "message": "", "metadata": { "attempt": 0, "name": "cluster-tools" }, "mounts": [ { "containerPath": "/run/systemd/", "gidMappings": [], "hostPath": "/run/systemd", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/proc", "gidMappings": [], "hostPath": "/proc", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/host", "gidMappings": [], "hostPath": "/", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/volumes/kubernetes.io~projected/kube-api-access-ztvd2", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/de1da172-4054-4a52-a719-d1d625a68358/containers/cluster-tools/fc1c432d", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-06-19T23:12:54.968820324Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:18:48] INFO -- CNTI: node_pid_by_container_id pid: 990003 [2025-06-19 23:18:48] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:48] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:48] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:48] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:48] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:48] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:48] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sleep\u0000infinity\u0000", error: ""} [2025-06-19 23:18:48] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:48] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:48] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:48] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:48] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:48] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:49] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t990003\nNgid:\t0\nPid:\t990003\nPPid:\t989952\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t990003\nNSpid:\t990003\nNSpgid:\t990003\nNSsid:\t990003\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t49\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-06-19 23:18:49] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:49] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:22Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5l98h", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:49] INFO -- CNTI: node_pid_by_container_id container_id: containerd://543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4 [2025-06-19 23:18:49] INFO -- CNTI: parse_container_id container_id: containerd://543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4 [2025-06-19 23:18:49] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:49] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:49] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:49] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:49] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:49] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:49Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:49Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:49] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--audit-interval=1\",\n \"--log-level=INFO\",\n \"--constraint-violations-limit=20\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--audit-from-cache=false\",\n \"--audit-chunk-size=500\",\n \"--audit-match-kind-only=false\",\n \"--audit-events-involved-namespace=false\",\n \"--operation=audit\",\n \"--operation=status\",\n \"--operation=generate\",\n \"--operation=mutation-status\",\n \"--logtostderr\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--metrics-backend=prometheus\",\n \"--disable-cert-rotation=false\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-audit-76b669b584-q6z5b,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-audit-76b669b584-q6z5b\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.136.94\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.136.94\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.136.94:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.136.94:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-audit-76b669b584-q6z5b\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"fb0c5cf3-e556-4f32-afa5-8733254c9908\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/tmp/audit\",\n \"host_path\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~empty-dir/tmp-volume\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~projected/kube-api-access-5l98h\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/containers/manager/dd277920\"\n }\n ]\n },\n \"pid\": 992757,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-audit-76b669b584-q6z5b\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"fb0c5cf3-e556-4f32-afa5-8733254c9908\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-podfb0c5cf3_e556_4f32_afa5_8733254c9908.slice:cri-containerd:543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/992715/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/992715/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/992715/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/tmp/audit\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~empty-dir/tmp-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/containers/manager/dd277920\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~projected/kube-api-access-5l98h\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--audit-interval=1\",\n \"--log-level=INFO\",\n \"--constraint-violations-limit=20\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--audit-from-cache=false\",\n \"--audit-chunk-size=500\",\n \"--audit-match-kind-only=false\",\n \"--audit-events-involved-namespace=false\",\n \"--operation=audit\",\n \"--operation=status\",\n \"--operation=generate\",\n \"--operation=mutation-status\",\n \"--logtostderr\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--metrics-backend=prometheus\",\n \"--disable-cert-rotation=false\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-audit-76b669b584-q6z5b\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-audit-76b669b584-q6z5b,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"POD_NAME=gatekeeper-audit-76b669b584-q6z5b\",\n \"NAMESPACE=cnf-testsuite\",\n \"CONTAINER_NAME=manager\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02\",\n \"snapshotKey\": \"543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-06-19T23:18:22.482232269Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-audit-76b669b584-q6z5b\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"fb0c5cf3-e556-4f32-afa5-8733254c9908\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-audit-76b669b584-q6z5b_fb0c5cf3-e556-4f32-afa5-8733254c9908/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/tmp/audit\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~empty-dir/tmp-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~projected/kube-api-access-5l98h\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/containers/manager/dd277920\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:18:22.729362503Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:49Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:49Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:49] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--audit-interval=1", "--log-level=INFO", "--constraint-violations-limit=20", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--audit-from-cache=false", "--audit-chunk-size=500", "--audit-match-kind-only=false", "--audit-events-involved-namespace=false", "--operation=audit", "--operation=status", "--operation=generate", "--operation=mutation-status", "--logtostderr", "--health-addr=:9090", "--prometheus-port=8888", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--metrics-backend=prometheus", "--disable-cert-rotation=false", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true" ], "command": [ "/manager" ], "envs": [ { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-audit-76b669b584-q6z5b,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "POD_NAME", "value": "gatekeeper-audit-76b669b584-q6z5b" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.136.94" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.136.94" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.136.94:443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.136.94:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-audit-76b669b584-q6z5b", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "fb0c5cf3-e556-4f32-afa5-8733254c9908" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/tmp/audit", "host_path": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~empty-dir/tmp-volume" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~projected/kube-api-access-5l98h", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/containers/manager/dd277920" } ] }, "pid": 992757, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02", "io.kubernetes.cri.sandbox-name": "gatekeeper-audit-76b669b584-q6z5b", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "fb0c5cf3-e556-4f32-afa5-8733254c9908" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-podfb0c5cf3_e556_4f32_afa5_8733254c9908.slice:cri-containerd:543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/992715/ns/ipc", "type": "ipc" }, { "path": "/proc/992715/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/992715/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/tmp/audit", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~empty-dir/tmp-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/containers/manager/dd277920", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~projected/kube-api-access-5l98h", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--audit-interval=1", "--log-level=INFO", "--constraint-violations-limit=20", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--audit-from-cache=false", "--audit-chunk-size=500", "--audit-match-kind-only=false", "--audit-events-involved-namespace=false", "--operation=audit", "--operation=status", "--operation=generate", "--operation=mutation-status", "--logtostderr", "--health-addr=:9090", "--prometheus-port=8888", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--metrics-backend=prometheus", "--disable-cert-rotation=false", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-audit-76b669b584-q6z5b", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-audit-76b669b584-q6z5b,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "POD_NAMESPACE=cnf-testsuite", "POD_NAME=gatekeeper-audit-76b669b584-q6z5b", "NAMESPACE=cnf-testsuite", "CONTAINER_NAME=manager", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94", "KUBERNETES_SERVICE_HOST=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "83d1e8ac6a0e339859657ac1d830b7ea49ba255a1c974e28735e650f1c238e02", "snapshotKey": "543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-06-19T23:18:22.482232269Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-audit-76b669b584-q6z5b", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "fb0c5cf3-e556-4f32-afa5-8733254c9908" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-audit-76b669b584-q6z5b_fb0c5cf3-e556-4f32-afa5-8733254c9908/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/tmp/audit", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~empty-dir/tmp-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/volumes/kubernetes.io~projected/kube-api-access-5l98h", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fb0c5cf3-e556-4f32-afa5-8733254c9908/containers/manager/dd277920", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-06-19T23:18:22.729362503Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-06-19 23:18:49] INFO -- CNTI: node_pid_by_container_id pid: 992757 [2025-06-19 23:18:49] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:49] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:49] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:49] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:49] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:49] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--audit-interval=1\u0000--log-level=INFO\u0000--constraint-violations-limit=20\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--audit-from-cache=false\u0000--audit-chunk-size=500\u0000--audit-match-kind-only=false\u0000--audit-events-involved-namespace=false\u0000--operation=audit\u0000--operation=status\u0000--operation=generate\u0000--operation=mutation-status\u0000--logtostderr\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--metrics-backend=prometheus\u0000--disable-cert-rotation=false\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000", error: ""} [2025-06-19 23:18:49] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:49] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:50] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:50] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:50] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:50] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992757\nNgid:\t0\nPid:\t992757\nPPid:\t992656\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992757\t1\nNSpid:\t992757\t1\nNSpgid:\t992757\t1\nNSsid:\t992757\t1\nVmPeak:\t 1313232 kB\nVmSize:\t 1313232 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 95820 kB\nVmRSS:\t 93764 kB\nRssAnon:\t 41364 kB\nRssFile:\t 52400 kB\nRssShmem:\t 0 kB\nVmData:\t 100692 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 348 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t55\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t222\nnonvoluntary_ctxt_switches:\t12\n", error: ""} [2025-06-19 23:18:50] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:50] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:23:58Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v131-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v131-worker"}, "name" => "v131-worker", "resourceVersion" => "1485511", "uid" => "c9d998fb-65b8-4e77-9a47-22a8ac5d4d53"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v131/v131-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.6", "type" => "InternalIP"}, {"address" => "v131-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:24:14Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.31.9", "registry.k8s.io/kube-apiserver:v1.31.9"], "sizeBytes" => 95177201}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.31.9", "registry.k8s.io/kube-proxy:v1.31.9"], "sizeBytes" => 93163721}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.31.9", "registry.k8s.io/kube-controller-manager:v1.31.9"], "sizeBytes" => 89782615}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.31.9", "registry.k8s.io/kube-scheduler:v1.31.9"], "sizeBytes" => 68925783}, {"names" => ["registry.k8s.io/etcd:3.5.15-0"], "sizeBytes" => 56909194}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:b173c7d0ffe3d805d49f4dfe48375169b7b8d2e1feb81783efd61eb9d08042e6", "registry.k8s.io/e2e-test-images/agnhost:2.52"], "sizeBytes" => 52184518}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:405a14e1aa702f7ea133cea459e8395fe40a6125c088c55569e696d48e1bd385", "registry.k8s.io/sig-storage/csi-provisioner:v5.0.1"], "sizeBytes" => 30334083}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:a541e6cc2d8b011bb21b1d4ffec6b090e85270cce6276ee302d86153eec0af43", "registry.k8s.io/sig-storage/csi-resizer:v1.11.1"], "sizeBytes" => 29161532}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:b4d611100ece2f9bc980d1cb19c2285b8868da261e3b1ee8f45448ab5512ab94", "registry.k8s.io/sig-storage/csi-attacher:v4.6.1"], "sizeBytes" => 28974442}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:ef95281310c7a23891b01f1e1c700330422c46636805a60eff76b5593031e141", "registry.k8s.io/sig-storage/hostpathplugin:v1.14.0"], "sizeBytes" => 21621791}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/aquasec/kube-bench@sha256:23d4ae0566b98dfee53d4b7a9ef824b6ed1c6b3a8f52bab927e5521f871b5104", "docker.io/aquasec/kube-bench:v0.6.10"], "sizeBytes" => 18243491}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:470c1006900856c57c8eb202b21eea57d3716824e36df45b1fb9d5a11150962a", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.2"], "sizeBytes" => 17992119}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:60b89953ccfc57b9774a2da7455578c712174cbdd144b84d08657e63583041ad", "registry.k8s.io/build-image/distroless-iptables:v0.5.6"], "sizeBytes" => 11491940}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:f25af73ee708ff9c82595ae99493cdef9295bd96953366cddf36305f82555dac", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1"], "sizeBytes" => 10984895}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}, {"names" => ["gcr.io/authenticated-image-pulling/alpine@sha256:7ff177862cb50c602bfe81f805969412e619c054a2bbead977d0c276988aa4a0", "gcr.io/authenticated-image-pulling/alpine:3.7"], "sizeBytes" => 2110879}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.31.9", "kubeletVersion" => "v1.31.9", "machineID" => "b72f0a7086364df789bf5323d74c2a55", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "e00b07f8-4137-4e86-a55d-aa0a75b8ea29"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-06-19T23:18:17Z", "generateName" => "gatekeeper-audit-76b669b584-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "audit-controller", "gatekeeper.sh/operation" => "audit", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "76b669b584", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-audit-76b669b584-q6z5b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-audit-76b669b584", "uid" => "cda1b09e-cb7a-4825-aa18-5f370d530049"}], "resourceVersion" => "1485485", "uid" => "fb0c5cf3-e556-4f32-afa5-8733254c9908"}, "spec" => {"affinity" => {}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--audit-interval=1", "--log-level=INFO", "--constraint-violations-limit=20", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--audit-from-cache=false", "--audit-chunk-size=500", "--audit-match-kind-only=false", "--audit-events-involved-namespace=false", "--operation=audit", "--operation=status", "--operation=generate", "--operation=mutation-status", "--logtostderr", "--health-addr=:9090", "--prometheus-port=8888", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--metrics-backend=prometheus", "--disable-cert-rotation=false", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5l98h", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v131-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"emptyDir" => {}, "name" => "tmp-volume"}, {"name" => "kube-api-access-5l98h", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:22Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5l98h", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.6", "hostIPs" => [{"ip" => "172.24.0.6"}], "phase" => "Running", "podIP" => "10.244.1.218", "podIPs" => [{"ip" => "10.244.1.218"}], "qosClass" => "Burstable", "startTime" => "2025-06-19T23:18:17Z"}}, container_status: {"containerID" => "containerd://543b8c1501990cf79022aea24559894ee1c916d3306393f1c7f6f9b98c6e74f4", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:22Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5l98h", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992757\nNgid:\t0\nPid:\t992757\nPPid:\t992656\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992757\t1\nNSpid:\t992757\t1\nNSpgid:\t992757\t1\nNSsid:\t992757\t1\nVmPeak:\t 1313232 kB\nVmSize:\t 1313232 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 95820 kB\nVmRSS:\t 93764 kB\nRssAnon:\t 41364 kB\nRssFile:\t 52400 kB\nRssShmem:\t 0 kB\nVmData:\t 100692 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 348 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t55\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t222\nnonvoluntary_ctxt_switches:\t12\n", pid: "992757", cmdline: "/manager\u0000--audit-interval=1\u0000--log-level=INFO\u0000--constraint-violations-limit=20\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--audit-from-cache=false\u0000--audit-chunk-size=500\u0000--audit-match-kind-only=false\u0000--audit-events-involved-namespace=false\u0000--operation=audit\u0000--operation=status\u0000--operation=generate\u0000--operation=mutation-status\u0000--logtostderr\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--metrics-backend=prometheus\u0000--disable-cert-rotation=false\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000"} [2025-06-19 23:18:50] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:23Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5dbq7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:50] INFO -- CNTI: node_pid_by_container_id container_id: containerd://dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71 [2025-06-19 23:18:50] INFO -- CNTI: parse_container_id container_id: containerd://dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71 [2025-06-19 23:18:50] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:50] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:50] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:50] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:50] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:50] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:50Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:50Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:50] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-controller-manager-84cc698fbc-4mbhm\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-4mbhm,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.136.94:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.136.94:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.136.94\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.136.94\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-84cc698fbc-4mbhm\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~projected/kube-api-access-5dbq7\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/containers/manager/1ac4496e\"\n }\n ]\n },\n \"pid\": 992815,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-controller-manager-84cc698fbc-4mbhm\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-podf31e0f48_b84b_43ff_b2e6_0f98ea6dbf3d.slice:cri-containerd:dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/992721/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/992721/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/992721/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/containers/manager/1ac4496e\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~projected/kube-api-access-5dbq7\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-controller-manager-84cc698fbc-4mbhm\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"POD_NAME=gatekeeper-controller-manager-84cc698fbc-4mbhm\",\n \"NAMESPACE=cnf-testsuite\",\n \"CONTAINER_NAME=manager\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-4mbhm,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c\",\n \"snapshotKey\": \"dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-06-19T23:18:23.245273326Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-84cc698fbc-4mbhm\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-84cc698fbc-4mbhm_f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~projected/kube-api-access-5dbq7\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/containers/manager/1ac4496e\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:18:23.461492592Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:50Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:50Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:50] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "command": [ "/manager" ], "envs": [ { "key": "POD_NAME", "value": "gatekeeper-controller-manager-84cc698fbc-4mbhm" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-4mbhm,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.136.94:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.136.94:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.136.94" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.136.94" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-84cc698fbc-4mbhm", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~projected/kube-api-access-5dbq7", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/containers/manager/1ac4496e" } ] }, "pid": 992815, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c", "io.kubernetes.cri.sandbox-name": "gatekeeper-controller-manager-84cc698fbc-4mbhm", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-podf31e0f48_b84b_43ff_b2e6_0f98ea6dbf3d.slice:cri-containerd:dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/992721/ns/ipc", "type": "ipc" }, { "path": "/proc/992721/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/992721/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/containers/manager/1ac4496e", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~projected/kube-api-access-5dbq7", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-controller-manager-84cc698fbc-4mbhm", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "POD_NAME=gatekeeper-controller-manager-84cc698fbc-4mbhm", "NAMESPACE=cnf-testsuite", "CONTAINER_NAME=manager", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-4mbhm,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "POD_NAMESPACE=cnf-testsuite", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "ff7e2966b7e734e1d71084d33c0f30331af919891eca9ed7cb7c4efe0335493c", "snapshotKey": "dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-06-19T23:18:23.245273326Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-84cc698fbc-4mbhm", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-84cc698fbc-4mbhm_f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/volumes/kubernetes.io~projected/kube-api-access-5dbq7", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d/containers/manager/1ac4496e", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-06-19T23:18:23.461492592Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-06-19 23:18:50] INFO -- CNTI: node_pid_by_container_id pid: 992815 [2025-06-19 23:18:50] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:50] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:50] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:50] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:50] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:51] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000", error: ""} [2025-06-19 23:18:51] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:51] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:51] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:51] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:51] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992815\nNgid:\t0\nPid:\t992815\nPPid:\t992683\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992815\t1\nNSpid:\t992815\t1\nNSpgid:\t992815\t1\nNSsid:\t992815\t1\nVmPeak:\t 1309200 kB\nVmSize:\t 1309200 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 86192 kB\nVmRSS:\t 86192 kB\nRssAnon:\t 33652 kB\nRssFile:\t 52540 kB\nRssShmem:\t 0 kB\nVmData:\t 88468 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 328 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t213\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-06-19 23:18:51] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:51] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:23:58Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v131-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v131-worker"}, "name" => "v131-worker", "resourceVersion" => "1485511", "uid" => "c9d998fb-65b8-4e77-9a47-22a8ac5d4d53"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v131/v131-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.6", "type" => "InternalIP"}, {"address" => "v131-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:25Z", "lastTransitionTime" => "2025-06-10T13:24:14Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.31.9", "registry.k8s.io/kube-apiserver:v1.31.9"], "sizeBytes" => 95177201}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.31.9", "registry.k8s.io/kube-proxy:v1.31.9"], "sizeBytes" => 93163721}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.31.9", "registry.k8s.io/kube-controller-manager:v1.31.9"], "sizeBytes" => 89782615}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.31.9", "registry.k8s.io/kube-scheduler:v1.31.9"], "sizeBytes" => 68925783}, {"names" => ["registry.k8s.io/etcd:3.5.15-0"], "sizeBytes" => 56909194}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:b173c7d0ffe3d805d49f4dfe48375169b7b8d2e1feb81783efd61eb9d08042e6", "registry.k8s.io/e2e-test-images/agnhost:2.52"], "sizeBytes" => 52184518}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:405a14e1aa702f7ea133cea459e8395fe40a6125c088c55569e696d48e1bd385", "registry.k8s.io/sig-storage/csi-provisioner:v5.0.1"], "sizeBytes" => 30334083}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:a541e6cc2d8b011bb21b1d4ffec6b090e85270cce6276ee302d86153eec0af43", "registry.k8s.io/sig-storage/csi-resizer:v1.11.1"], "sizeBytes" => 29161532}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:b4d611100ece2f9bc980d1cb19c2285b8868da261e3b1ee8f45448ab5512ab94", "registry.k8s.io/sig-storage/csi-attacher:v4.6.1"], "sizeBytes" => 28974442}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:ef95281310c7a23891b01f1e1c700330422c46636805a60eff76b5593031e141", "registry.k8s.io/sig-storage/hostpathplugin:v1.14.0"], "sizeBytes" => 21621791}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/aquasec/kube-bench@sha256:23d4ae0566b98dfee53d4b7a9ef824b6ed1c6b3a8f52bab927e5521f871b5104", "docker.io/aquasec/kube-bench:v0.6.10"], "sizeBytes" => 18243491}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:470c1006900856c57c8eb202b21eea57d3716824e36df45b1fb9d5a11150962a", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.2"], "sizeBytes" => 17992119}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:60b89953ccfc57b9774a2da7455578c712174cbdd144b84d08657e63583041ad", "registry.k8s.io/build-image/distroless-iptables:v0.5.6"], "sizeBytes" => 11491940}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:f25af73ee708ff9c82595ae99493cdef9295bd96953366cddf36305f82555dac", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1"], "sizeBytes" => 10984895}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}, {"names" => ["gcr.io/authenticated-image-pulling/alpine@sha256:7ff177862cb50c602bfe81f805969412e619c054a2bbead977d0c276988aa4a0", "gcr.io/authenticated-image-pulling/alpine:3.7"], "sizeBytes" => 2110879}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.31.9", "kubeletVersion" => "v1.31.9", "machineID" => "b72f0a7086364df789bf5323d74c2a55", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "e00b07f8-4137-4e86-a55d-aa0a75b8ea29"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-06-19T23:18:17Z", "generateName" => "gatekeeper-controller-manager-84cc698fbc-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "84cc698fbc", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-controller-manager-84cc698fbc-4mbhm", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-controller-manager-84cc698fbc", "uid" => "35d2df79-9eb3-48d2-9b78-f97ac7a789d7"}], "resourceVersion" => "1485488", "uid" => "f31e0f48-b84b-43ff-b2e6-0f98ea6dbf3d"}, "spec" => {"affinity" => {"podAntiAffinity" => {"preferredDuringSchedulingIgnoredDuringExecution" => [{"podAffinityTerm" => {"labelSelector" => {"matchExpressions" => [{"key" => "gatekeeper.sh/operation", "operator" => "In", "values" => ["webhook"]}]}, "topologyKey" => "kubernetes.io/hostname"}, "weight" => 100}]}}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8443, "name" => "webhook-server", "protocol" => "TCP"}, {"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5dbq7", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v131-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"name" => "kube-api-access-5dbq7", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:23Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5dbq7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.6", "hostIPs" => [{"ip" => "172.24.0.6"}], "phase" => "Running", "podIP" => "10.244.1.219", "podIPs" => [{"ip" => "10.244.1.219"}], "qosClass" => "Burstable", "startTime" => "2025-06-19T23:18:17Z"}}, container_status: {"containerID" => "containerd://dc07b0e79273a25376a4bc1d5677cd20e50fcc45a7fa970ce94d8a23c1a9ce71", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:23Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5dbq7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992815\nNgid:\t0\nPid:\t992815\nPPid:\t992683\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992815\t1\nNSpid:\t992815\t1\nNSpgid:\t992815\t1\nNSsid:\t992815\t1\nVmPeak:\t 1309200 kB\nVmSize:\t 1309200 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 86192 kB\nVmRSS:\t 86192 kB\nRssAnon:\t 33652 kB\nRssFile:\t 52540 kB\nRssShmem:\t 0 kB\nVmData:\t 88468 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 328 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t213\nnonvoluntary_ctxt_switches:\t9\n", pid: "992815", cmdline: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000"} [2025-06-19 23:18:51] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:18Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-4d6xt", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:51] INFO -- CNTI: node_pid_by_container_id container_id: containerd://d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29 [2025-06-19 23:18:51] INFO -- CNTI: parse_container_id container_id: containerd://d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29 [2025-06-19 23:18:51] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:51] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:51] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:51] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:51] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:51Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:51Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:51] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440\",\n \"user_specified_image\": \"alpine:3.6\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-gj76m\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"74f85062-9b41-4704-abc0-f4224a00b81b\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"loopdev/0.log\",\n \"metadata\": {\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/dev\",\n \"host_path\": \"/dev\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/volumes/kubernetes.io~projected/kube-api-access-4d6xt\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/containers/loopdev/bce5c67d\"\n }\n ]\n },\n \"pid\": 858,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"loopdev\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"alpine:3.6\",\n \"io.kubernetes.cri.sandbox-id\": \"60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2\",\n \"io.kubernetes.cri.sandbox-name\": \"create-loop-devs-gj76m\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"74f85062-9b41-4704-abc0-f4224a00b81b\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod74f85062_9b41_4704_abc0_f4224a00b81b.slice:cri-containerd:d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/826/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/826/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/826/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/dev\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/containers/loopdev/bce5c67d\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/volumes/kubernetes.io~projected/kube-api-access-4d6xt\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=create-loop-devs-gj76m\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0,\n 1,\n 2,\n 3,\n 4,\n 6,\n 10,\n 11,\n 20,\n 26,\n 27\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2\",\n \"snapshotKey\": \"d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:18.458686145Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/library/alpine:3.6\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-gj76m\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"74f85062-9b41-4704-abc0-f4224a00b81b\"\n },\n \"logPath\": \"/var/log/pods/kube-system_create-loop-devs-gj76m_74f85062-9b41-4704-abc0-f4224a00b81b/loopdev/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/dev\",\n \"gidMappings\": [],\n \"hostPath\": \"/dev\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/volumes/kubernetes.io~projected/kube-api-access-4d6xt\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/containers/loopdev/bce5c67d\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:18.597387623Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\",\n \"1\",\n \"2\",\n \"3\",\n \"4\",\n \"6\",\n \"10\",\n \"11\",\n \"20\",\n \"26\",\n \"27\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:51Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:51Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:51] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "envs": [ { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" } ], "image": { "image": "sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440", "user_specified_image": "alpine:3.6" }, "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-gj76m", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "74f85062-9b41-4704-abc0-f4224a00b81b" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "loopdev/0.log", "metadata": { "name": "loopdev" }, "mounts": [ { "container_path": "/dev", "host_path": "/dev" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/volumes/kubernetes.io~projected/kube-api-access-4d6xt", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/containers/loopdev/bce5c67d" } ] }, "pid": 858, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "loopdev", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "alpine:3.6", "io.kubernetes.cri.sandbox-id": "60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2", "io.kubernetes.cri.sandbox-name": "create-loop-devs-gj76m", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "74f85062-9b41-4704-abc0-f4224a00b81b" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod74f85062_9b41_4704_abc0_f4224a00b81b.slice:cri-containerd:d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/826/ns/ipc", "type": "ipc" }, { "path": "/proc/826/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/826/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/dev", "options": [ "rbind", "rprivate", "rw" ], "source": "/dev", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/containers/loopdev/bce5c67d", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/volumes/kubernetes.io~projected/kube-api-access-4d6xt", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=create-loop-devs-gj76m", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0, 1, 2, 3, 4, 6, 10, 11, 20, 26, 27 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "60aaab247c985280f995bdcd2854ed9ad10faaa3574d94b53c128a9b32132de2", "snapshotKey": "d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:18.458686145Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "d52e3f7c7a838dfe46638079d298585bfa1781cb8aa64cd3842d592d22685e29", "image": { "annotations": {}, "image": "docker.io/library/alpine:3.6", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-gj76m", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "74f85062-9b41-4704-abc0-f4224a00b81b" }, "logPath": "/var/log/pods/kube-system_create-loop-devs-gj76m_74f85062-9b41-4704-abc0-f4224a00b81b/loopdev/0.log", "message": "", "metadata": { "attempt": 0, "name": "loopdev" }, "mounts": [ { "containerPath": "/dev", "gidMappings": [], "hostPath": "/dev", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/volumes/kubernetes.io~projected/kube-api-access-4d6xt", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/74f85062-9b41-4704-abc0-f4224a00b81b/containers/loopdev/bce5c67d", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-06-10T13:24:18.597387623Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0", "1", "2", "3", "4", "6", "10", "11", "20", "26", "27" ], "uid": "0" } } } } [2025-06-19 23:18:51] INFO -- CNTI: node_pid_by_container_id pid: 858 [2025-06-19 23:18:51] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:52] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:52] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:52] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:52] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sh\u0000-c\u0000while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n\u0000", error: ""} [2025-06-19 23:18:52] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:52] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:52] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:52] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:52] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:52] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t858\nNgid:\t0\nPid:\t858\nPPid:\t801\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t858\t1\nNSpid:\t858\t1\nNSpgid:\t858\t1\nNSsid:\t858\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t916\nnonvoluntary_ctxt_switches:\t7\n", error: ""} [2025-06-19 23:18:52] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:52] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2", "image" => "docker.io/kindest/kindnetd:v20250512-df8de77b", "imageID" => "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:03Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/nri", "name" => "nri-plugin"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-92dg4", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:52] INFO -- CNTI: node_pid_by_container_id container_id: containerd://ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2 [2025-06-19 23:18:52] INFO -- CNTI: parse_container_id container_id: containerd://ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2 [2025-06-19 23:18:52] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:52] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:52] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:52] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:52] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:53] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:53Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:53Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:53] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"envs\": [\n {\n \"key\": \"HOST_IP\",\n \"value\": \"172.24.0.6\"\n },\n {\n \"key\": \"POD_IP\",\n \"value\": \"172.24.0.6\"\n },\n {\n \"key\": \"POD_SUBNET\",\n \"value\": \"10.244.0.0/16\"\n },\n {\n \"key\": \"CONTROL_PLANE_ENDPOINT\",\n \"value\": \"v131-control-plane:6443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"user_specified_image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-htvqt\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"7ec89f98-9006-4a88-a5cb-baa490ebec45\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 52428800,\n \"memory_swap_limit_in_bytes\": 52428800,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"capabilities\": {\n \"add_capabilities\": [\n \"NET_RAW\",\n \"NET_ADMIN\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kindnet-cni/0.log\",\n \"metadata\": {\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/cni/net.d\",\n \"host_path\": \"/etc/cni/net.d\"\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/nri\",\n \"host_path\": \"/var/run/nri\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/volumes/kubernetes.io~projected/kube-api-access-92dg4\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/containers/kindnet-cni/24466029\"\n }\n ]\n },\n \"pid\": 689,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kindnet-cni\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"io.kubernetes.cri.sandbox-id\": \"8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af\",\n \"io.kubernetes.cri.sandbox-name\": \"kindnet-htvqt\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"7ec89f98-9006-4a88-a5cb-baa490ebec45\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pod7ec89f98_9006_4a88_a5cb_baa490ebec45.slice:cri-containerd:ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/449/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/449/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/449/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 52428800,\n \"swap\": 52428800\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/containers/kindnet-cni/24466029\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/cni/net.d\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/etc/cni/net.d\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/nri\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/run/nri\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/volumes/kubernetes.io~projected/kube-api-access-92dg4\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/kindnetd\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v131-worker\",\n \"HOST_IP=172.24.0.6\",\n \"POD_IP=172.24.0.6\",\n \"POD_SUBNET=10.244.0.0/16\",\n \"CONTROL_PLANE_ENDPOINT=v131-control-plane:6443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af\",\n \"snapshotKey\": \"ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:01.719791102Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-htvqt\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"7ec89f98-9006-4a88-a5cb-baa490ebec45\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kindnet-htvqt_7ec89f98-9006-4a88-a5cb-baa490ebec45/kindnet-cni/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/cni/net.d\",\n \"gidMappings\": [],\n \"hostPath\": \"/etc/cni/net.d\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/nri\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/run/nri\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/volumes/kubernetes.io~projected/kube-api-access-92dg4\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/containers/kindnet-cni/24466029\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"52428800\",\n \"memorySwapLimitInBytes\": \"52428800\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:03.299801428Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:53Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:53Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:53] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "envs": [ { "key": "HOST_IP", "value": "172.24.0.6" }, { "key": "POD_IP", "value": "172.24.0.6" }, { "key": "POD_SUBNET", "value": "10.244.0.0/16" }, { "key": "CONTROL_PLANE_ENDPOINT", "value": "v131-control-plane:6443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" } ], "image": { "image": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "user_specified_image": "docker.io/kindest/kindnetd:v20250512-df8de77b" }, "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-htvqt", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "7ec89f98-9006-4a88-a5cb-baa490ebec45" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 52428800, "memory_swap_limit_in_bytes": 52428800, "oom_score_adj": -997 }, "security_context": { "capabilities": { "add_capabilities": [ "NET_RAW", "NET_ADMIN" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kindnet-cni/0.log", "metadata": { "name": "kindnet-cni" }, "mounts": [ { "container_path": "/etc/cni/net.d", "host_path": "/etc/cni/net.d" }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/nri", "host_path": "/var/run/nri" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/volumes/kubernetes.io~projected/kube-api-access-92dg4", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/containers/kindnet-cni/24466029" } ] }, "pid": 689, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kindnet-cni", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/kindest/kindnetd:v20250512-df8de77b", "io.kubernetes.cri.sandbox-id": "8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af", "io.kubernetes.cri.sandbox-name": "kindnet-htvqt", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "7ec89f98-9006-4a88-a5cb-baa490ebec45" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pod7ec89f98_9006_4a88_a5cb_baa490ebec45.slice:cri-containerd:ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/449/ns/ipc", "type": "ipc" }, { "path": "/proc/449/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/449/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 52428800, "swap": 52428800 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/containers/kindnet-cni/24466029", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af/shm", "type": "bind" }, { "destination": "/etc/cni/net.d", "options": [ "rbind", "rprivate", "rw" ], "source": "/etc/cni/net.d", "type": "bind" }, { "destination": "/var/run/nri", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/run/nri", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/volumes/kubernetes.io~projected/kube-api-access-92dg4", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/kindnetd" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v131-worker", "HOST_IP=172.24.0.6", "POD_IP=172.24.0.6", "POD_SUBNET=10.244.0.0/16", "CONTROL_PLANE_ENDPOINT=v131-control-plane:6443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_SERVICE_PORT_DNS=53" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "8fa60f662477041b879f9928f83267647256bd34dbc0b24760e96ee6071259af", "snapshotKey": "ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:01.719791102Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "ba77a88a7aa163011fadc007df802d49cab04a9f59eb651cb98e59be2e6378b2", "image": { "annotations": {}, "image": "docker.io/kindest/kindnetd:v20250512-df8de77b", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-htvqt", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "7ec89f98-9006-4a88-a5cb-baa490ebec45" }, "logPath": "/var/log/pods/kube-system_kindnet-htvqt_7ec89f98-9006-4a88-a5cb-baa490ebec45/kindnet-cni/0.log", "message": "", "metadata": { "attempt": 0, "name": "kindnet-cni" }, "mounts": [ { "containerPath": "/etc/cni/net.d", "gidMappings": [], "hostPath": "/etc/cni/net.d", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/nri", "gidMappings": [], "hostPath": "/var/run/nri", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/volumes/kubernetes.io~projected/kube-api-access-92dg4", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7ec89f98-9006-4a88-a5cb-baa490ebec45/containers/kindnet-cni/24466029", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "52428800", "memorySwapLimitInBytes": "52428800", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:03.299801428Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:18:53] INFO -- CNTI: node_pid_by_container_id pid: 689 [2025-06-19 23:18:53] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:53] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:53] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:53] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:53] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:53] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/bin/kindnetd\u0000", error: ""} [2025-06-19 23:18:53] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:53] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:53] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:53] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:53] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:53] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t689\nNgid:\t0\nPid:\t689\nPPid:\t398\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t689\t1\nNSpid:\t689\t1\nNSpgid:\t689\t1\nNSsid:\t689\t1\nVmPeak:\t 1285960 kB\nVmSize:\t 1285960 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 50012 kB\nVmRSS:\t 26704 kB\nRssAnon:\t 13712 kB\nRssFile:\t 12992 kB\nRssShmem:\t 0 kB\nVmData:\t 64400 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 260 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t37\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t777\nnonvoluntary_ctxt_switches:\t13\n", error: ""} [2025-06-19 23:18:53] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:53] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6", "image" => "registry.k8s.io/kube-proxy-amd64:v1.31.9", "imageID" => "sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:00Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-szrc6", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:53] INFO -- CNTI: node_pid_by_container_id container_id: containerd://f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6 [2025-06-19 23:18:53] INFO -- CNTI: parse_container_id container_id: containerd://f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6 [2025-06-19 23:18:53] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:53] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:53] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:53] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:53] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:54] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:54Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:54Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:54] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"94ebe9f0\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v131-worker\"\n ],\n \"envs\": [\n {\n \"key\": \"NODE_NAME\",\n \"value\": \"v131-worker\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\",\n \"user_specified_image\": \"registry.k8s.io/kube-proxy:v1.31.9\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-h9krb\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"3a56a8ec-3e34-4309-ba90-6245482b6f1f\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kube-proxy/0.log\",\n \"metadata\": {\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/var/lib/kube-proxy\",\n \"host_path\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~configmap/kube-proxy\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~projected/kube-api-access-szrc6\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/containers/kube-proxy/3694085f\"\n }\n ]\n },\n \"pid\": 497,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kube-proxy\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"registry.k8s.io/kube-proxy:v1.31.9\",\n \"io.kubernetes.cri.sandbox-id\": \"4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc\",\n \"io.kubernetes.cri.sandbox-name\": \"kube-proxy-h9krb\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"3a56a8ec-3e34-4309-ba90-6245482b6f1f\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod3a56a8ec_3e34_4309_ba90_6245482b6f1f.slice:cri-containerd:f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/442/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/442/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/442/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/containers/kube-proxy/3694085f\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/lib/kube-proxy\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~configmap/kube-proxy\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~projected/kube-api-access-szrc6\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v131-worker\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v131-worker\",\n \"NODE_NAME=v131-worker\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc\",\n \"snapshotKey\": \"f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"94ebe9f0\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:00.377570357Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"registry.k8s.io/kube-proxy-amd64:v1.31.9\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-h9krb\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"3a56a8ec-3e34-4309-ba90-6245482b6f1f\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kube-proxy-h9krb_3a56a8ec-3e34-4309-ba90-6245482b6f1f/kube-proxy/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/var/lib/kube-proxy\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~configmap/kube-proxy\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~projected/kube-api-access-szrc6\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/containers/kube-proxy/3694085f\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:00.674002137Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:54Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:54Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:54] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "94ebe9f0", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v131-worker" ], "envs": [ { "key": "NODE_NAME", "value": "v131-worker" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" } ], "image": { "image": "sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578", "user_specified_image": "registry.k8s.io/kube-proxy:v1.31.9" }, "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-h9krb", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "3a56a8ec-3e34-4309-ba90-6245482b6f1f" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kube-proxy/0.log", "metadata": { "name": "kube-proxy" }, "mounts": [ { "container_path": "/var/lib/kube-proxy", "host_path": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~configmap/kube-proxy", "readonly": true }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~projected/kube-api-access-szrc6", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/containers/kube-proxy/3694085f" } ] }, "pid": 497, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kube-proxy", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "registry.k8s.io/kube-proxy:v1.31.9", "io.kubernetes.cri.sandbox-id": "4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc", "io.kubernetes.cri.sandbox-name": "kube-proxy-h9krb", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "3a56a8ec-3e34-4309-ba90-6245482b6f1f" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod3a56a8ec_3e34_4309_ba90_6245482b6f1f.slice:cri-containerd:f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/442/ns/ipc", "type": "ipc" }, { "path": "/proc/442/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/442/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/containers/kube-proxy/3694085f", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc/shm", "type": "bind" }, { "destination": "/var/lib/kube-proxy", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~configmap/kube-proxy", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~projected/kube-api-access-szrc6", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v131-worker" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v131-worker", "NODE_NAME=v131-worker", "KUBERNETES_SERVICE_PORT=443", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "4dcc66205cc13181eba14520959e92f0c8e98e3375322882f6f5842432c940dc", "snapshotKey": "f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "94ebe9f0", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:00.377570357Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "f17c55011d1e6dca0639bb7ae055229fb159325ffcc433a44f0d08d1d35c97f6", "image": { "annotations": {}, "image": "registry.k8s.io/kube-proxy-amd64:v1.31.9", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578", "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-h9krb", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "3a56a8ec-3e34-4309-ba90-6245482b6f1f" }, "logPath": "/var/log/pods/kube-system_kube-proxy-h9krb_3a56a8ec-3e34-4309-ba90-6245482b6f1f/kube-proxy/0.log", "message": "", "metadata": { "attempt": 0, "name": "kube-proxy" }, "mounts": [ { "containerPath": "/var/lib/kube-proxy", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~configmap/kube-proxy", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/volumes/kubernetes.io~projected/kube-api-access-szrc6", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/3a56a8ec-3e34-4309-ba90-6245482b6f1f/containers/kube-proxy/3694085f", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:00.674002137Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:18:54] INFO -- CNTI: node_pid_by_container_id pid: 497 [2025-06-19 23:18:54] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:54] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:54] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:54] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:54] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:54] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/usr/local/bin/kube-proxy\u0000--config=/var/lib/kube-proxy/config.conf\u0000--hostname-override=v131-worker\u0000", error: ""} [2025-06-19 23:18:54] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:54] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:54] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:54] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:54] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:55] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t497\nNgid:\t559558\nPid:\t497\nPPid:\t394\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t497\t1\nNSpid:\t497\t1\nNSpgid:\t497\t1\nNSsid:\t497\t1\nVmPeak:\t 1296940 kB\nVmSize:\t 1296940 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 57204 kB\nVmRSS:\t 31452 kB\nRssAnon:\t 17044 kB\nRssFile:\t 14408 kB\nRssShmem:\t 0 kB\nVmData:\t 70032 kB\nVmStk:\t 132 kB\nVmExe:\t 29500 kB\nVmLib:\t 8 kB\nVmPTE:\t 276 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t33\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t19519\nnonvoluntary_ctxt_switches:\t70\n", error: ""} [2025-06-19 23:18:55] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:55] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:15:11Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-gxbpd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:55] INFO -- CNTI: node_pid_by_container_id container_id: containerd://36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673 [2025-06-19 23:18:55] INFO -- CNTI: parse_container_id container_id: containerd://36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673 [2025-06-19 23:18:55] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:55] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:55] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:55] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:55] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:55] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:55Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:55Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:55] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"22c004da\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-leader-elect=true\"\n ],\n \"command\": [\n \"chaos-operator\"\n ],\n \"envs\": [\n {\n \"key\": \"CHAOS_RUNNER_IMAGE\",\n \"value\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0\"\n },\n {\n \"key\": \"WATCH_NAMESPACE\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"chaos-operator-ce-586f75ccbc-rcqjh\"\n },\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"litmus\"\n },\n {\n \"key\": \"OPERATOR_NAME\",\n \"value\": \"chaos-operator\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:feb9fa7af3287f70de9d9d07874894380e09996165152bbfc481b0011bf82b12\",\n \"user_specified_image\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"chaos-operator\",\n \"io.kubernetes.pod.name\": \"chaos-operator-ce-586f75ccbc-rcqjh\",\n \"io.kubernetes.pod.namespace\": \"litmus\",\n \"io.kubernetes.pod.uid\": \"758273c5-9708-47fd-87a2-3fef8035e575\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_username\": \"litmus\",\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"chaos-operator/0.log\",\n \"metadata\": {\n \"name\": \"chaos-operator\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/volumes/kubernetes.io~projected/kube-api-access-gxbpd\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/containers/chaos-operator/15027235\"\n }\n ]\n },\n \"pid\": 991440,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"chaos-operator\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0\",\n \"io.kubernetes.cri.sandbox-id\": \"6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517\",\n \"io.kubernetes.cri.sandbox-name\": \"chaos-operator-ce-586f75ccbc-rcqjh\",\n \"io.kubernetes.cri.sandbox-namespace\": \"litmus\",\n \"io.kubernetes.cri.sandbox-uid\": \"758273c5-9708-47fd-87a2-3fef8035e575\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod758273c5_9708_47fd_87a2_3fef8035e575.slice:cri-containerd:36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/991413/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/991413/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/991413/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/containers/chaos-operator/15027235\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/volumes/kubernetes.io~projected/kube-api-access-gxbpd\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"chaos-operator\",\n \"-leader-elect=true\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/litmus\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=chaos-operator-ce-586f75ccbc-rcqjh\",\n \"APP_USER=litmus\",\n \"APP_DIR=/litmus\",\n \"DATA_DIR=/litmus/data\",\n \"CONF_DIR=/litmus/conf\",\n \"OPERATOR=/usr/local/bin/chaos-operator\",\n \"CHAOS_RUNNER_IMAGE=litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0\",\n \"WATCH_NAMESPACE=\",\n \"POD_NAME=chaos-operator-ce-586f75ccbc-rcqjh\",\n \"POD_NAMESPACE=litmus\",\n \"OPERATOR_NAME=chaos-operator\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 1000\n ],\n \"gid\": 1000,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517\",\n \"snapshotKey\": \"36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"22c004da\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-19T23:15:10.823624915Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"chaos-operator\",\n \"io.kubernetes.pod.name\": \"chaos-operator-ce-586f75ccbc-rcqjh\",\n \"io.kubernetes.pod.namespace\": \"litmus\",\n \"io.kubernetes.pod.uid\": \"758273c5-9708-47fd-87a2-3fef8035e575\"\n },\n \"logPath\": \"/var/log/pods/litmus_chaos-operator-ce-586f75ccbc-rcqjh_758273c5-9708-47fd-87a2-3fef8035e575/chaos-operator/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"chaos-operator\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/volumes/kubernetes.io~projected/kube-api-access-gxbpd\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/containers/chaos-operator/15027235\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:15:11.029803947Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"1000\",\n \"supplementalGroups\": [\n \"1000\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:55Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:55Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:55] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "22c004da", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "envs": [ { "key": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "key": "WATCH_NAMESPACE" }, { "key": "POD_NAME", "value": "chaos-operator-ce-586f75ccbc-rcqjh" }, { "key": "POD_NAMESPACE", "value": "litmus" }, { "key": "OPERATOR_NAME", "value": "chaos-operator" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" } ], "image": { "image": "sha256:feb9fa7af3287f70de9d9d07874894380e09996165152bbfc481b0011bf82b12", "user_specified_image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" }, "labels": { "io.kubernetes.container.name": "chaos-operator", "io.kubernetes.pod.name": "chaos-operator-ce-586f75ccbc-rcqjh", "io.kubernetes.pod.namespace": "litmus", "io.kubernetes.pod.uid": "758273c5-9708-47fd-87a2-3fef8035e575" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_username": "litmus", "seccomp": { "profile_type": 1 } } }, "log_path": "chaos-operator/0.log", "metadata": { "name": "chaos-operator" }, "mounts": [ { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/volumes/kubernetes.io~projected/kube-api-access-gxbpd", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/containers/chaos-operator/15027235" } ] }, "pid": 991440, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "chaos-operator", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "io.kubernetes.cri.sandbox-id": "6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517", "io.kubernetes.cri.sandbox-name": "chaos-operator-ce-586f75ccbc-rcqjh", "io.kubernetes.cri.sandbox-namespace": "litmus", "io.kubernetes.cri.sandbox-uid": "758273c5-9708-47fd-87a2-3fef8035e575" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod758273c5_9708_47fd_87a2_3fef8035e575.slice:cri-containerd:36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/991413/ns/ipc", "type": "ipc" }, { "path": "/proc/991413/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/991413/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/containers/chaos-operator/15027235", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/volumes/kubernetes.io~projected/kube-api-access-gxbpd", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "chaos-operator", "-leader-elect=true" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/litmus", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=chaos-operator-ce-586f75ccbc-rcqjh", "APP_USER=litmus", "APP_DIR=/litmus", "DATA_DIR=/litmus/data", "CONF_DIR=/litmus/conf", "OPERATOR=/usr/local/bin/chaos-operator", "CHAOS_RUNNER_IMAGE=litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0", "WATCH_NAMESPACE=", "POD_NAME=chaos-operator-ce-586f75ccbc-rcqjh", "POD_NAMESPACE=litmus", "OPERATOR_NAME=chaos-operator", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 1000 ], "gid": 1000, "uid": 1000 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "6fb0355c5e0fef095855dd7b48ed0872c4dd694147736159313b6b4d2c0ef517", "snapshotKey": "36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "22c004da", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-19T23:15:10.823624915Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "36af4b5bf32bcb2975f536dafc38c3660de9be2b6b3daa3a79f43fe150bcf673", "image": { "annotations": {}, "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "labels": { "io.kubernetes.container.name": "chaos-operator", "io.kubernetes.pod.name": "chaos-operator-ce-586f75ccbc-rcqjh", "io.kubernetes.pod.namespace": "litmus", "io.kubernetes.pod.uid": "758273c5-9708-47fd-87a2-3fef8035e575" }, "logPath": "/var/log/pods/litmus_chaos-operator-ce-586f75ccbc-rcqjh_758273c5-9708-47fd-87a2-3fef8035e575/chaos-operator/0.log", "message": "", "metadata": { "attempt": 0, "name": "chaos-operator" }, "mounts": [ { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/volumes/kubernetes.io~projected/kube-api-access-gxbpd", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/758273c5-9708-47fd-87a2-3fef8035e575/containers/chaos-operator/15027235", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-06-19T23:15:11.029803947Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "1000", "supplementalGroups": [ "1000" ], "uid": "1000" } } } } [2025-06-19 23:18:55] INFO -- CNTI: node_pid_by_container_id pid: 991440 [2025-06-19 23:18:55] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:55] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:55] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:55] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:55] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:55] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "chaos-operator\u0000-leader-elect=true\u0000", error: ""} [2025-06-19 23:18:55] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:55] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:55] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:18:55] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:18:55] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:18:56] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991440\nNgid:\t0\nPid:\t991440\nPPid:\t991390\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t991440\t1\nNSpid:\t991440\t1\nNSpgid:\t991440\t1\nNSsid:\t991440\t1\nVmPeak:\t 1262956 kB\nVmSize:\t 1262956 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 37648 kB\nVmRSS:\t 37648 kB\nRssAnon:\t 14876 kB\nRssFile:\t 22772 kB\nRssShmem:\t 0 kB\nVmData:\t 63684 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 192 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t561\nnonvoluntary_ctxt_switches:\t13\n", error: ""} [2025-06-19 23:18:56] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:56] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:56] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 6 pods: cluster-tools-crvg8, gatekeeper-controller-manager-84cc698fbc-rm4bt, gatekeeper-controller-manager-84cc698fbc-scj7x, create-loop-devs-p2hcc, kindnet-f9g2x, kube-proxy-cplll [2025-06-19 23:18:56] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2", "image" => "docker.io/lfncnti/cluster-tools:v1.0.8", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:12:54Z"}}, "volumeMounts" => [{"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/host", "name" => "hostfs"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-v8xwf", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:56] INFO -- CNTI: node_pid_by_container_id container_id: containerd://1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2 [2025-06-19 23:18:56] INFO -- CNTI: parse_container_id container_id: containerd://1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2 [2025-06-19 23:18:56] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:56] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:56] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:56] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:56] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:56] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:56Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:56Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:57] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f\",\n \"user_specified_image\": \"lfncnti/cluster-tools:v1.0.8\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-crvg8\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 2\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"cluster-tools/0.log\",\n \"metadata\": {\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/run/systemd/\",\n \"host_path\": \"/run/systemd\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/proc\",\n \"host_path\": \"/proc\"\n },\n {\n \"container_path\": \"/host\",\n \"host_path\": \"/\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/volumes/kubernetes.io~projected/kube-api-access-v8xwf\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/containers/cluster-tools/83249830\"\n }\n ]\n },\n \"pid\": 956360,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"cluster-tools\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"lfncnti/cluster-tools:v1.0.8\",\n \"io.kubernetes.cri.sandbox-id\": \"ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732\",\n \"io.kubernetes.cri.sandbox-name\": \"cluster-tools-crvg8\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod90c12a6b_a11a_4a43_ad7c_b4169cd5a2ee.slice:cri-containerd:1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 1000,\n \"path\": \"/dev/loop1000\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/loop128\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/loop129\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/loop130\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/loop131\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/loop132\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/loop133\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/loop134\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 135,\n \"path\": \"/dev/loop135\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 136,\n \"path\": \"/dev/loop136\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 137,\n \"path\": \"/dev/loop137\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 138,\n \"path\": \"/dev/loop138\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 139,\n \"path\": \"/dev/loop139\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 140,\n \"path\": \"/dev/loop140\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 141,\n \"path\": \"/dev/loop141\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 142,\n \"path\": \"/dev/loop142\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 143,\n \"path\": \"/dev/loop143\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 144,\n \"path\": \"/dev/loop144\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 145,\n \"path\": \"/dev/loop145\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 146,\n \"path\": \"/dev/loop146\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 147,\n \"path\": \"/dev/loop147\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 148,\n \"path\": \"/dev/loop148\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 149,\n \"path\": \"/dev/loop149\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 150,\n \"path\": \"/dev/loop150\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 151,\n \"path\": \"/dev/loop151\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 152,\n \"path\": \"/dev/loop152\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 153,\n \"path\": \"/dev/loop153\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 154,\n \"path\": \"/dev/loop154\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 155,\n \"path\": \"/dev/loop155\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 156,\n \"path\": \"/dev/loop156\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 157,\n \"path\": \"/dev/loop157\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 158,\n \"path\": \"/dev/loop158\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 159,\n \"path\": \"/dev/loop159\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 160,\n \"path\": \"/dev/loop160\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 161,\n \"path\": \"/dev/loop161\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 162,\n \"path\": \"/dev/loop162\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 163,\n \"path\": \"/dev/loop163\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 164,\n \"path\": \"/dev/loop164\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 165,\n \"path\": \"/dev/loop165\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 166,\n \"path\": \"/dev/loop166\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 167,\n \"path\": \"/dev/loop167\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 168,\n \"path\": \"/dev/loop168\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 169,\n \"path\": \"/dev/loop169\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 170,\n \"path\": \"/dev/loop170\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 171,\n \"path\": \"/dev/loop171\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 172,\n \"path\": \"/dev/loop172\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 173,\n \"path\": \"/dev/loop173\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 174,\n \"path\": \"/dev/loop174\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 175,\n \"path\": \"/dev/loop175\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 176,\n \"path\": \"/dev/loop176\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 177,\n \"path\": \"/dev/loop177\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 178,\n \"path\": \"/dev/loop178\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 179,\n \"path\": \"/dev/loop179\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 180,\n \"path\": \"/dev/loop180\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 181,\n \"path\": \"/dev/loop181\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 182,\n \"path\": \"/dev/loop182\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 183,\n \"path\": \"/dev/loop183\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 184,\n \"path\": \"/dev/loop184\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 185,\n \"path\": \"/dev/loop185\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 186,\n \"path\": \"/dev/loop186\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 187,\n \"path\": \"/dev/loop187\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 188,\n \"path\": \"/dev/loop188\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 189,\n \"path\": \"/dev/loop189\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 190,\n \"path\": \"/dev/loop190\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 191,\n \"path\": \"/dev/loop191\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 192,\n \"path\": \"/dev/loop192\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 193,\n \"path\": \"/dev/loop193\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 194,\n \"path\": \"/dev/loop194\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 195,\n \"path\": \"/dev/loop195\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 196,\n \"path\": \"/dev/loop196\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 197,\n \"path\": \"/dev/loop197\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 198,\n \"path\": \"/dev/loop198\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 199,\n \"path\": \"/dev/loop199\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 200,\n \"path\": \"/dev/loop200\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 201,\n \"path\": \"/dev/loop201\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 202,\n \"path\": \"/dev/loop202\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 203,\n \"path\": \"/dev/loop203\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 204,\n \"path\": \"/dev/loop204\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 205,\n \"path\": \"/dev/loop205\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 206,\n \"path\": \"/dev/loop206\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 207,\n \"path\": \"/dev/loop207\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 208,\n \"path\": \"/dev/loop208\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 209,\n \"path\": \"/dev/loop209\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 210,\n \"path\": \"/dev/loop210\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 211,\n \"path\": \"/dev/loop211\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 212,\n \"path\": \"/dev/loop212\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 213,\n \"path\": \"/dev/loop213\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 214,\n \"path\": \"/dev/loop214\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 215,\n \"path\": \"/dev/loop215\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 216,\n \"path\": \"/dev/loop216\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 217,\n \"path\": \"/dev/loop217\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 218,\n \"path\": \"/dev/loop218\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 219,\n \"path\": \"/dev/loop219\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 220,\n \"path\": \"/dev/loop220\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 221,\n \"path\": \"/dev/loop221\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 222,\n \"path\": \"/dev/loop222\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 223,\n \"path\": \"/dev/loop223\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 224,\n \"path\": \"/dev/loop224\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 225,\n \"path\": \"/dev/loop225\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 226,\n \"path\": \"/dev/loop226\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 227,\n \"path\": \"/dev/loop227\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 228,\n \"path\": \"/dev/loop228\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 229,\n \"path\": \"/dev/loop229\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 230,\n \"path\": \"/dev/loop230\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 231,\n \"path\": \"/dev/loop231\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 232,\n \"path\": \"/dev/loop232\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 233,\n \"path\": \"/dev/loop233\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 234,\n \"path\": \"/dev/loop234\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 235,\n \"path\": \"/dev/loop235\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 236,\n \"path\": \"/dev/loop236\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 237,\n \"path\": \"/dev/loop237\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 238,\n \"path\": \"/dev/loop238\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 239,\n \"path\": \"/dev/loop239\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 240,\n \"path\": \"/dev/loop240\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 241,\n \"path\": \"/dev/loop241\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 242,\n \"path\": \"/dev/loop242\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 243,\n \"path\": \"/dev/loop243\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 244,\n \"path\": \"/dev/loop244\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 245,\n \"path\": \"/dev/loop245\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 246,\n \"path\": \"/dev/loop246\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 247,\n \"path\": \"/dev/loop247\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 248,\n \"path\": \"/dev/loop248\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 249,\n \"path\": \"/dev/loop249\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 250,\n \"path\": \"/dev/loop250\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 251,\n \"path\": \"/dev/loop251\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 252,\n \"path\": \"/dev/loop252\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 253,\n \"path\": \"/dev/loop253\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 254,\n \"path\": \"/dev/loop254\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 255,\n \"path\": \"/dev/loop255\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 256,\n \"path\": \"/dev/loop256\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 257,\n \"path\": \"/dev/loop257\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 258,\n \"path\": \"/dev/loop258\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 259,\n \"path\": \"/dev/loop259\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 260,\n \"path\": \"/dev/loop260\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 261,\n \"path\": \"/dev/loop261\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 262,\n \"path\": \"/dev/loop262\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 263,\n \"path\": \"/dev/loop263\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 264,\n \"path\": \"/dev/loop264\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 265,\n \"path\": \"/dev/loop265\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 266,\n \"path\": \"/dev/loop266\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 267,\n \"path\": \"/dev/loop267\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 268,\n \"path\": \"/dev/loop268\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 269,\n \"path\": \"/dev/loop269\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 270,\n \"path\": \"/dev/loop270\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 271,\n \"path\": \"/dev/loop271\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 272,\n \"path\": \"/dev/loop272\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 273,\n \"path\": \"/dev/loop273\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 274,\n \"path\": \"/dev/loop274\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 275,\n \"path\": \"/dev/loop275\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 276,\n \"path\": \"/dev/loop276\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 277,\n \"path\": \"/dev/loop277\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 278,\n \"path\": \"/dev/loop278\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 279,\n \"path\": \"/dev/loop279\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 280,\n \"path\": \"/dev/loop280\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 281,\n \"path\": \"/dev/loop281\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 282,\n \"path\": \"/dev/loop282\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 283,\n \"path\": \"/dev/loop283\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 284,\n \"path\": \"/dev/loop284\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 285,\n \"path\": \"/dev/loop285\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 286,\n \"path\": \"/dev/loop286\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 287,\n \"path\": \"/dev/loop287\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 288,\n \"path\": \"/dev/loop288\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 289,\n \"path\": \"/dev/loop289\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 290,\n \"path\": \"/dev/loop290\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 291,\n \"path\": \"/dev/loop291\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 292,\n \"path\": \"/dev/loop292\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 293,\n \"path\": \"/dev/loop293\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 294,\n \"path\": \"/dev/loop294\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 295,\n \"path\": \"/dev/loop295\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 296,\n \"path\": \"/dev/loop296\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 297,\n \"path\": \"/dev/loop297\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 298,\n \"path\": \"/dev/loop298\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 299,\n \"path\": \"/dev/loop299\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 300,\n \"path\": \"/dev/loop300\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 301,\n \"path\": \"/dev/loop301\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 302,\n \"path\": \"/dev/loop302\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 303,\n \"path\": \"/dev/loop303\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 304,\n \"path\": \"/dev/loop304\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 305,\n \"path\": \"/dev/loop305\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 306,\n \"path\": \"/dev/loop306\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 307,\n \"path\": \"/dev/loop307\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 308,\n \"path\": \"/dev/loop308\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 309,\n \"path\": \"/dev/loop309\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 310,\n \"path\": \"/dev/loop310\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 311,\n \"path\": \"/dev/loop311\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 312,\n \"path\": \"/dev/loop312\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 313,\n \"path\": \"/dev/loop313\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 314,\n \"path\": \"/dev/loop314\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 315,\n \"path\": \"/dev/loop315\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 316,\n \"path\": \"/dev/loop316\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 317,\n \"path\": \"/dev/loop317\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 318,\n \"path\": \"/dev/loop318\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 319,\n \"path\": \"/dev/loop319\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 320,\n \"path\": \"/dev/loop320\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 321,\n \"path\": \"/dev/loop321\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 322,\n \"path\": \"/dev/loop322\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 323,\n \"path\": \"/dev/loop323\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 324,\n \"path\": \"/dev/loop324\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 325,\n \"path\": \"/dev/loop325\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 326,\n \"path\": \"/dev/loop326\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 327,\n \"path\": \"/dev/loop327\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 328,\n \"path\": \"/dev/loop328\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 329,\n \"path\": \"/dev/loop329\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 330,\n \"path\": \"/dev/loop330\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 331,\n \"path\": \"/dev/loop331\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 332,\n \"path\": \"/dev/loop332\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 333,\n \"path\": \"/dev/loop333\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 334,\n \"path\": \"/dev/loop334\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 335,\n \"path\": \"/dev/loop335\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 336,\n \"path\": \"/dev/loop336\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 337,\n \"path\": \"/dev/loop337\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 338,\n \"path\": \"/dev/loop338\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 339,\n \"path\": \"/dev/loop339\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 340,\n \"path\": \"/dev/loop340\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 341,\n \"path\": \"/dev/loop341\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 342,\n \"path\": \"/dev/loop342\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 343,\n \"path\": \"/dev/loop343\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 344,\n \"path\": \"/dev/loop344\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 345,\n \"path\": \"/dev/loop345\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 346,\n \"path\": \"/dev/loop346\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 347,\n \"path\": \"/dev/loop347\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 348,\n \"path\": \"/dev/loop348\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 349,\n \"path\": \"/dev/loop349\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 350,\n \"path\": \"/dev/loop350\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 351,\n \"path\": \"/dev/loop351\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 352,\n \"path\": \"/dev/loop352\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 353,\n \"path\": \"/dev/loop353\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 354,\n \"path\": \"/dev/loop354\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 355,\n \"path\": \"/dev/loop355\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 356,\n \"path\": \"/dev/loop356\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 357,\n \"path\": \"/dev/loop357\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 358,\n \"path\": \"/dev/loop358\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 359,\n \"path\": \"/dev/loop359\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 360,\n \"path\": \"/dev/loop360\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 361,\n \"path\": \"/dev/loop361\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 362,\n \"path\": \"/dev/loop362\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 363,\n \"path\": \"/dev/loop363\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 364,\n \"path\": \"/dev/loop364\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 365,\n \"path\": \"/dev/loop365\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 366,\n \"path\": \"/dev/loop366\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 367,\n \"path\": \"/dev/loop367\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 368,\n \"path\": \"/dev/loop368\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 369,\n \"path\": \"/dev/loop369\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 370,\n \"path\": \"/dev/loop370\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 371,\n \"path\": \"/dev/loop371\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 372,\n \"path\": \"/dev/loop372\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 373,\n \"path\": \"/dev/loop373\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 374,\n \"path\": \"/dev/loop374\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 375,\n \"path\": \"/dev/loop375\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 376,\n \"path\": \"/dev/loop376\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 377,\n \"path\": \"/dev/loop377\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 378,\n \"path\": \"/dev/loop378\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 379,\n \"path\": \"/dev/loop379\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 380,\n \"path\": \"/dev/loop380\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 381,\n \"path\": \"/dev/loop381\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 382,\n \"path\": \"/dev/loop382\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 383,\n \"path\": \"/dev/loop383\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 384,\n \"path\": \"/dev/loop384\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 385,\n \"path\": \"/dev/loop385\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 386,\n \"path\": \"/dev/loop386\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 387,\n \"path\": \"/dev/loop387\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 388,\n \"path\": \"/dev/loop388\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 389,\n \"path\": \"/dev/loop389\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 390,\n \"path\": \"/dev/loop390\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 391,\n \"path\": \"/dev/loop391\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 392,\n \"path\": \"/dev/loop392\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 393,\n \"path\": \"/dev/loop393\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 394,\n \"path\": \"/dev/loop394\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 395,\n \"path\": \"/dev/loop395\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 396,\n \"path\": \"/dev/loop396\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 397,\n \"path\": \"/dev/loop397\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 398,\n \"path\": \"/dev/loop398\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 399,\n \"path\": \"/dev/loop399\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 400,\n \"path\": \"/dev/loop400\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 401,\n \"path\": \"/dev/loop401\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 402,\n \"path\": \"/dev/loop402\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 403,\n \"path\": \"/dev/loop403\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 404,\n \"path\": \"/dev/loop404\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 405,\n \"path\": \"/dev/loop405\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 406,\n \"path\": \"/dev/loop406\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 407,\n \"path\": \"/dev/loop407\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 408,\n \"path\": \"/dev/loop408\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 409,\n \"path\": \"/dev/loop409\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 410,\n \"path\": \"/dev/loop410\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 411,\n \"path\": \"/dev/loop411\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 412,\n \"path\": \"/dev/loop412\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 413,\n \"path\": \"/dev/loop413\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 414,\n \"path\": \"/dev/loop414\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 415,\n \"path\": \"/dev/loop415\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 416,\n \"path\": \"/dev/loop416\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 417,\n \"path\": \"/dev/loop417\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 418,\n \"path\": \"/dev/loop418\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 419,\n \"path\": \"/dev/loop419\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 420,\n \"path\": \"/dev/loop420\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 421,\n \"path\": \"/dev/loop421\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 422,\n \"path\": \"/dev/loop422\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 423,\n \"path\": \"/dev/loop423\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 424,\n \"path\": \"/dev/loop424\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 425,\n \"path\": \"/dev/loop425\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 426,\n \"path\": \"/dev/loop426\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 427,\n \"path\": \"/dev/loop427\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 428,\n \"path\": \"/dev/loop428\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 429,\n \"path\": \"/dev/loop429\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 430,\n \"path\": \"/dev/loop430\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 431,\n \"path\": \"/dev/loop431\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 432,\n \"path\": \"/dev/loop432\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 433,\n \"path\": \"/dev/loop433\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 434,\n \"path\": \"/dev/loop434\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 435,\n \"path\": \"/dev/loop435\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 436,\n \"path\": \"/dev/loop436\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 437,\n \"path\": \"/dev/loop437\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 438,\n \"path\": \"/dev/loop438\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 439,\n \"path\": \"/dev/loop439\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 440,\n \"path\": \"/dev/loop440\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 441,\n \"path\": \"/dev/loop441\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 442,\n \"path\": \"/dev/loop442\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 443,\n \"path\": \"/dev/loop443\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 444,\n \"path\": \"/dev/loop444\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 445,\n \"path\": \"/dev/loop445\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 446,\n \"path\": \"/dev/loop446\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 447,\n \"path\": \"/dev/loop447\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 448,\n \"path\": \"/dev/loop448\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 449,\n \"path\": \"/dev/loop449\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 450,\n \"path\": \"/dev/loop450\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 451,\n \"path\": \"/dev/loop451\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 452,\n \"path\": \"/dev/loop452\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 453,\n \"path\": \"/dev/loop453\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 454,\n \"path\": \"/dev/loop454\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 455,\n \"path\": \"/dev/loop455\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 456,\n \"path\": \"/dev/loop456\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 457,\n \"path\": \"/dev/loop457\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 458,\n \"path\": \"/dev/loop458\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 459,\n \"path\": \"/dev/loop459\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 460,\n \"path\": \"/dev/loop460\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 461,\n \"path\": \"/dev/loop461\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 462,\n \"path\": \"/dev/loop462\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 463,\n \"path\": \"/dev/loop463\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 464,\n \"path\": \"/dev/loop464\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 465,\n \"path\": \"/dev/loop465\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 466,\n \"path\": \"/dev/loop466\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 467,\n \"path\": \"/dev/loop467\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 468,\n \"path\": \"/dev/loop468\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 469,\n \"path\": \"/dev/loop469\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 470,\n \"path\": \"/dev/loop470\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 471,\n \"path\": \"/dev/loop471\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 472,\n \"path\": \"/dev/loop472\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 473,\n \"path\": \"/dev/loop473\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 474,\n \"path\": \"/dev/loop474\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 475,\n \"path\": \"/dev/loop475\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 476,\n \"path\": \"/dev/loop476\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 477,\n \"path\": \"/dev/loop477\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 478,\n \"path\": \"/dev/loop478\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 479,\n \"path\": \"/dev/loop479\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 480,\n \"path\": \"/dev/loop480\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 481,\n \"path\": \"/dev/loop481\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 482,\n \"path\": \"/dev/loop482\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 483,\n \"path\": \"/dev/loop483\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 484,\n \"path\": \"/dev/loop484\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 485,\n \"path\": \"/dev/loop485\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 486,\n \"path\": \"/dev/loop486\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 487,\n \"path\": \"/dev/loop487\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 488,\n \"path\": \"/dev/loop488\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 489,\n \"path\": \"/dev/loop489\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 490,\n \"path\": \"/dev/loop490\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 491,\n \"path\": \"/dev/loop491\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 492,\n \"path\": \"/dev/loop492\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 493,\n \"path\": \"/dev/loop493\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 494,\n \"path\": \"/dev/loop494\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 495,\n \"path\": \"/dev/loop495\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 496,\n \"path\": \"/dev/loop496\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 497,\n \"path\": \"/dev/loop497\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 498,\n \"path\": \"/dev/loop498\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 499,\n \"path\": \"/dev/loop499\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 500,\n \"path\": \"/dev/loop500\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 501,\n \"path\": \"/dev/loop501\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 502,\n \"path\": \"/dev/loop502\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 503,\n \"path\": \"/dev/loop503\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 504,\n \"path\": \"/dev/loop504\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 505,\n \"path\": \"/dev/loop505\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 506,\n \"path\": \"/dev/loop506\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 507,\n \"path\": \"/dev/loop507\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 508,\n \"path\": \"/dev/loop508\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 509,\n \"path\": \"/dev/loop509\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 510,\n \"path\": \"/dev/loop510\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 511,\n \"path\": \"/dev/loop511\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 512,\n \"path\": \"/dev/loop512\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 513,\n \"path\": \"/dev/loop513\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 514,\n \"path\": \"/dev/loop514\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 515,\n \"path\": \"/dev/loop515\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 516,\n \"path\": \"/dev/loop516\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 517,\n \"path\": \"/dev/loop517\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 518,\n \"path\": \"/dev/loop518\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 519,\n \"path\": \"/dev/loop519\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 520,\n \"path\": \"/dev/loop520\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 521,\n \"path\": \"/dev/loop521\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 522,\n \"path\": \"/dev/loop522\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 523,\n \"path\": \"/dev/loop523\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 524,\n \"path\": \"/dev/loop524\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 525,\n \"path\": \"/dev/loop525\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 526,\n \"path\": \"/dev/loop526\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 527,\n \"path\": \"/dev/loop527\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 528,\n \"path\": \"/dev/loop528\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 529,\n \"path\": \"/dev/loop529\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 530,\n \"path\": \"/dev/loop530\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 531,\n \"path\": \"/dev/loop531\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 532,\n \"path\": \"/dev/loop532\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 533,\n \"path\": \"/dev/loop533\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 534,\n \"path\": \"/dev/loop534\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 535,\n \"path\": \"/dev/loop535\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 536,\n \"path\": \"/dev/loop536\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 537,\n \"path\": \"/dev/loop537\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 538,\n \"path\": \"/dev/loop538\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 539,\n \"path\": \"/dev/loop539\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 540,\n \"path\": \"/dev/loop540\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 541,\n \"path\": \"/dev/loop541\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 542,\n \"path\": \"/dev/loop542\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 543,\n \"path\": \"/dev/loop543\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 544,\n \"path\": \"/dev/loop544\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 545,\n \"path\": \"/dev/loop545\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 546,\n \"path\": \"/dev/loop546\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 547,\n \"path\": \"/dev/loop547\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 548,\n \"path\": \"/dev/loop548\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 549,\n \"path\": \"/dev/loop549\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 550,\n \"path\": \"/dev/loop550\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 551,\n \"path\": \"/dev/loop551\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 552,\n \"path\": \"/dev/loop552\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 553,\n \"path\": \"/dev/loop553\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 554,\n \"path\": \"/dev/loop554\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 555,\n \"path\": \"/dev/loop555\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 556,\n \"path\": \"/dev/loop556\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 557,\n \"path\": \"/dev/loop557\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 558,\n \"path\": \"/dev/loop558\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 559,\n \"path\": \"/dev/loop559\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 560,\n \"path\": \"/dev/loop560\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 561,\n \"path\": \"/dev/loop561\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 562,\n \"path\": \"/dev/loop562\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 563,\n \"path\": \"/dev/loop563\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 564,\n \"path\": \"/dev/loop564\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 565,\n \"path\": \"/dev/loop565\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 566,\n \"path\": \"/dev/loop566\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 567,\n \"path\": \"/dev/loop567\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 568,\n \"path\": \"/dev/loop568\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 569,\n \"path\": \"/dev/loop569\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 570,\n \"path\": \"/dev/loop570\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 571,\n \"path\": \"/dev/loop571\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 572,\n \"path\": \"/dev/loop572\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 573,\n \"path\": \"/dev/loop573\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 574,\n \"path\": \"/dev/loop574\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 575,\n \"path\": \"/dev/loop575\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 576,\n \"path\": \"/dev/loop576\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 577,\n \"path\": \"/dev/loop577\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 578,\n \"path\": \"/dev/loop578\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 579,\n \"path\": \"/dev/loop579\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 580,\n \"path\": \"/dev/loop580\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 581,\n \"path\": \"/dev/loop581\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 582,\n \"path\": \"/dev/loop582\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 583,\n \"path\": \"/dev/loop583\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 584,\n \"path\": \"/dev/loop584\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 585,\n \"path\": \"/dev/loop585\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 586,\n \"path\": \"/dev/loop586\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 587,\n \"path\": \"/dev/loop587\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 588,\n \"path\": \"/dev/loop588\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 589,\n \"path\": \"/dev/loop589\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 590,\n \"path\": \"/dev/loop590\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 591,\n \"path\": \"/dev/loop591\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 592,\n \"path\": \"/dev/loop592\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 593,\n \"path\": \"/dev/loop593\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 594,\n \"path\": \"/dev/loop594\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 595,\n \"path\": \"/dev/loop595\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 596,\n \"path\": \"/dev/loop596\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 597,\n \"path\": \"/dev/loop597\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 598,\n \"path\": \"/dev/loop598\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 599,\n \"path\": \"/dev/loop599\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 600,\n \"path\": \"/dev/loop600\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 601,\n \"path\": \"/dev/loop601\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 602,\n \"path\": \"/dev/loop602\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 603,\n \"path\": \"/dev/loop603\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 604,\n \"path\": \"/dev/loop604\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 605,\n \"path\": \"/dev/loop605\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 606,\n \"path\": \"/dev/loop606\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 607,\n \"path\": \"/dev/loop607\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 608,\n \"path\": \"/dev/loop608\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 609,\n \"path\": \"/dev/loop609\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 610,\n \"path\": \"/dev/loop610\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 611,\n \"path\": \"/dev/loop611\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 612,\n \"path\": \"/dev/loop612\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 613,\n \"path\": \"/dev/loop613\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 614,\n \"path\": \"/dev/loop614\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 615,\n \"path\": \"/dev/loop615\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 616,\n \"path\": \"/dev/loop616\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 617,\n \"path\": \"/dev/loop617\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 618,\n \"path\": \"/dev/loop618\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 619,\n \"path\": \"/dev/loop619\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 620,\n \"path\": \"/dev/loop620\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 621,\n \"path\": \"/dev/loop621\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 622,\n \"path\": \"/dev/loop622\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 623,\n \"path\": \"/dev/loop623\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 624,\n \"path\": \"/dev/loop624\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 625,\n \"path\": \"/dev/loop625\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 626,\n \"path\": \"/dev/loop626\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 627,\n \"path\": \"/dev/loop627\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 628,\n \"path\": \"/dev/loop628\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 629,\n \"path\": \"/dev/loop629\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 630,\n \"path\": \"/dev/loop630\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 631,\n \"path\": \"/dev/loop631\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 632,\n \"path\": \"/dev/loop632\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 633,\n \"path\": \"/dev/loop633\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 634,\n \"path\": \"/dev/loop634\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 635,\n \"path\": \"/dev/loop635\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 636,\n \"path\": \"/dev/loop636\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 637,\n \"path\": \"/dev/loop637\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 638,\n \"path\": \"/dev/loop638\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 639,\n \"path\": \"/dev/loop639\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 640,\n \"path\": \"/dev/loop640\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 641,\n \"path\": \"/dev/loop641\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 642,\n \"path\": \"/dev/loop642\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 643,\n \"path\": \"/dev/loop643\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 644,\n \"path\": \"/dev/loop644\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 645,\n \"path\": \"/dev/loop645\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 646,\n \"path\": \"/dev/loop646\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 647,\n \"path\": \"/dev/loop647\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 648,\n \"path\": \"/dev/loop648\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 649,\n \"path\": \"/dev/loop649\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 650,\n \"path\": \"/dev/loop650\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 651,\n \"path\": \"/dev/loop651\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 652,\n \"path\": \"/dev/loop652\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 653,\n \"path\": \"/dev/loop653\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 654,\n \"path\": \"/dev/loop654\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 655,\n \"path\": \"/dev/loop655\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 656,\n \"path\": \"/dev/loop656\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 657,\n \"path\": \"/dev/loop657\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 658,\n \"path\": \"/dev/loop658\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 659,\n \"path\": \"/dev/loop659\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 660,\n \"path\": \"/dev/loop660\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 661,\n \"path\": \"/dev/loop661\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 662,\n \"path\": \"/dev/loop662\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 663,\n \"path\": \"/dev/loop663\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 664,\n \"path\": \"/dev/loop664\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 665,\n \"path\": \"/dev/loop665\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 666,\n \"path\": \"/dev/loop666\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 667,\n \"path\": \"/dev/loop667\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 668,\n \"path\": \"/dev/loop668\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 669,\n \"path\": \"/dev/loop669\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 670,\n \"path\": \"/dev/loop670\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 671,\n \"path\": \"/dev/loop671\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 672,\n \"path\": \"/dev/loop672\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 673,\n \"path\": \"/dev/loop673\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 674,\n \"path\": \"/dev/loop674\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 675,\n \"path\": \"/dev/loop675\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 676,\n \"path\": \"/dev/loop676\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 677,\n \"path\": \"/dev/loop677\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 678,\n \"path\": \"/dev/loop678\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 679,\n \"path\": \"/dev/loop679\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 680,\n \"path\": \"/dev/loop680\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 681,\n \"path\": \"/dev/loop681\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 682,\n \"path\": \"/dev/loop682\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 683,\n \"path\": \"/dev/loop683\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 684,\n \"path\": \"/dev/loop684\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 685,\n \"path\": \"/dev/loop685\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 686,\n \"path\": \"/dev/loop686\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 687,\n \"path\": \"/dev/loop687\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 688,\n \"path\": \"/dev/loop688\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 689,\n \"path\": \"/dev/loop689\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 690,\n \"path\": \"/dev/loop690\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 691,\n \"path\": \"/dev/loop691\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 692,\n \"path\": \"/dev/loop692\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 693,\n \"path\": \"/dev/loop693\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 694,\n \"path\": \"/dev/loop694\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 695,\n \"path\": \"/dev/loop695\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 696,\n \"path\": \"/dev/loop696\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 697,\n \"path\": \"/dev/loop697\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 698,\n \"path\": \"/dev/loop698\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 699,\n \"path\": \"/dev/loop699\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 700,\n \"path\": \"/dev/loop700\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 701,\n \"path\": \"/dev/loop701\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 702,\n \"path\": \"/dev/loop702\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 703,\n \"path\": \"/dev/loop703\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 704,\n \"path\": \"/dev/loop704\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 705,\n \"path\": \"/dev/loop705\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 706,\n \"path\": \"/dev/loop706\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 707,\n \"path\": \"/dev/loop707\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 708,\n \"path\": \"/dev/loop708\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 709,\n \"path\": \"/dev/loop709\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 710,\n \"path\": \"/dev/loop710\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 711,\n \"path\": \"/dev/loop711\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 712,\n \"path\": \"/dev/loop712\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 713,\n \"path\": \"/dev/loop713\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 714,\n \"path\": \"/dev/loop714\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 715,\n \"path\": \"/dev/loop715\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 716,\n \"path\": \"/dev/loop716\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 717,\n \"path\": \"/dev/loop717\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 718,\n \"path\": \"/dev/loop718\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 719,\n \"path\": \"/dev/loop719\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 720,\n \"path\": \"/dev/loop720\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 721,\n \"path\": \"/dev/loop721\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 722,\n \"path\": \"/dev/loop722\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 723,\n \"path\": \"/dev/loop723\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 724,\n \"path\": \"/dev/loop724\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 725,\n \"path\": \"/dev/loop725\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 726,\n \"path\": \"/dev/loop726\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 727,\n \"path\": \"/dev/loop727\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 728,\n \"path\": \"/dev/loop728\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 729,\n \"path\": \"/dev/loop729\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 730,\n \"path\": \"/dev/loop730\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 731,\n \"path\": \"/dev/loop731\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 732,\n \"path\": \"/dev/loop732\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 733,\n \"path\": \"/dev/loop733\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 734,\n \"path\": \"/dev/loop734\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 735,\n \"path\": \"/dev/loop735\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 736,\n \"path\": \"/dev/loop736\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 737,\n \"path\": \"/dev/loop737\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 738,\n \"path\": \"/dev/loop738\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 739,\n \"path\": \"/dev/loop739\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 740,\n \"path\": \"/dev/loop740\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 741,\n \"path\": \"/dev/loop741\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 742,\n \"path\": \"/dev/loop742\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 743,\n \"path\": \"/dev/loop743\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 744,\n \"path\": \"/dev/loop744\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 745,\n \"path\": \"/dev/loop745\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 746,\n \"path\": \"/dev/loop746\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 747,\n \"path\": \"/dev/loop747\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 748,\n \"path\": \"/dev/loop748\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 749,\n \"path\": \"/dev/loop749\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 750,\n \"path\": \"/dev/loop750\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 751,\n \"path\": \"/dev/loop751\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 752,\n \"path\": \"/dev/loop752\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 753,\n \"path\": \"/dev/loop753\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 754,\n \"path\": \"/dev/loop754\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 755,\n \"path\": \"/dev/loop755\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 756,\n \"path\": \"/dev/loop756\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 757,\n \"path\": \"/dev/loop757\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 758,\n \"path\": \"/dev/loop758\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 759,\n \"path\": \"/dev/loop759\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 760,\n \"path\": \"/dev/loop760\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 761,\n \"path\": \"/dev/loop761\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 762,\n \"path\": \"/dev/loop762\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 763,\n \"path\": \"/dev/loop763\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 764,\n \"path\": \"/dev/loop764\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 765,\n \"path\": \"/dev/loop765\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 766,\n \"path\": \"/dev/loop766\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 767,\n \"path\": \"/dev/loop767\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 768,\n \"path\": \"/dev/loop768\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 769,\n \"path\": \"/dev/loop769\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 770,\n \"path\": \"/dev/loop770\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 771,\n \"path\": \"/dev/loop771\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 772,\n \"path\": \"/dev/loop772\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 773,\n \"path\": \"/dev/loop773\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 774,\n \"path\": \"/dev/loop774\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 775,\n \"path\": \"/dev/loop775\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 776,\n \"path\": \"/dev/loop776\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 777,\n \"path\": \"/dev/loop777\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 778,\n \"path\": \"/dev/loop778\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 779,\n \"path\": \"/dev/loop779\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 780,\n \"path\": \"/dev/loop780\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 781,\n \"path\": \"/dev/loop781\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 782,\n \"path\": \"/dev/loop782\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 783,\n \"path\": \"/dev/loop783\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 784,\n \"path\": \"/dev/loop784\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 785,\n \"path\": \"/dev/loop785\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 786,\n \"path\": \"/dev/loop786\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 787,\n \"path\": \"/dev/loop787\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 788,\n \"path\": \"/dev/loop788\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 789,\n \"path\": \"/dev/loop789\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 790,\n \"path\": \"/dev/loop790\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 791,\n \"path\": \"/dev/loop791\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 792,\n \"path\": \"/dev/loop792\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 793,\n \"path\": \"/dev/loop793\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 794,\n \"path\": \"/dev/loop794\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 795,\n \"path\": \"/dev/loop795\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 796,\n \"path\": \"/dev/loop796\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 797,\n \"path\": \"/dev/loop797\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 798,\n \"path\": \"/dev/loop798\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 799,\n \"path\": \"/dev/loop799\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 800,\n \"path\": \"/dev/loop800\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 801,\n \"path\": \"/dev/loop801\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 802,\n \"path\": \"/dev/loop802\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 803,\n \"path\": \"/dev/loop803\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 804,\n \"path\": \"/dev/loop804\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 805,\n \"path\": \"/dev/loop805\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 806,\n \"path\": \"/dev/loop806\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 807,\n \"path\": \"/dev/loop807\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 808,\n \"path\": \"/dev/loop808\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 809,\n \"path\": \"/dev/loop809\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 810,\n \"path\": \"/dev/loop810\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 811,\n \"path\": \"/dev/loop811\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 812,\n \"path\": \"/dev/loop812\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 813,\n \"path\": \"/dev/loop813\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 814,\n \"path\": \"/dev/loop814\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 815,\n \"path\": \"/dev/loop815\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 816,\n \"path\": \"/dev/loop816\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 817,\n \"path\": \"/dev/loop817\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 818,\n \"path\": \"/dev/loop818\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 819,\n \"path\": \"/dev/loop819\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 820,\n \"path\": \"/dev/loop820\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 821,\n \"path\": \"/dev/loop821\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 822,\n \"path\": \"/dev/loop822\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 823,\n \"path\": \"/dev/loop823\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 824,\n \"path\": \"/dev/loop824\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 825,\n \"path\": \"/dev/loop825\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 826,\n \"path\": \"/dev/loop826\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 827,\n \"path\": \"/dev/loop827\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 828,\n \"path\": \"/dev/loop828\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 829,\n \"path\": \"/dev/loop829\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 830,\n \"path\": \"/dev/loop830\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 831,\n \"path\": \"/dev/loop831\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 832,\n \"path\": \"/dev/loop832\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 833,\n \"path\": \"/dev/loop833\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 834,\n \"path\": \"/dev/loop834\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 835,\n \"path\": \"/dev/loop835\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 836,\n \"path\": \"/dev/loop836\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 837,\n \"path\": \"/dev/loop837\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 838,\n \"path\": \"/dev/loop838\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 839,\n \"path\": \"/dev/loop839\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 840,\n \"path\": \"/dev/loop840\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 841,\n \"path\": \"/dev/loop841\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 842,\n \"path\": \"/dev/loop842\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 843,\n \"path\": \"/dev/loop843\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 844,\n \"path\": \"/dev/loop844\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 845,\n \"path\": \"/dev/loop845\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 846,\n \"path\": \"/dev/loop846\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 847,\n \"path\": \"/dev/loop847\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 848,\n \"path\": \"/dev/loop848\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 849,\n \"path\": \"/dev/loop849\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 850,\n \"path\": \"/dev/loop850\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 851,\n \"path\": \"/dev/loop851\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 852,\n \"path\": \"/dev/loop852\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 853,\n \"path\": \"/dev/loop853\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 854,\n \"path\": \"/dev/loop854\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 855,\n \"path\": \"/dev/loop855\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 856,\n \"path\": \"/dev/loop856\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 857,\n \"path\": \"/dev/loop857\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 858,\n \"path\": \"/dev/loop858\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 859,\n \"path\": \"/dev/loop859\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 860,\n \"path\": \"/dev/loop860\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 861,\n \"path\": \"/dev/loop861\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 862,\n \"path\": \"/dev/loop862\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 863,\n \"path\": \"/dev/loop863\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 864,\n \"path\": \"/dev/loop864\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 865,\n \"path\": \"/dev/loop865\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 866,\n \"path\": \"/dev/loop866\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 867,\n \"path\": \"/dev/loop867\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 868,\n \"path\": \"/dev/loop868\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 869,\n \"path\": \"/dev/loop869\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 870,\n \"path\": \"/dev/loop870\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 871,\n \"path\": \"/dev/loop871\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 872,\n \"path\": \"/dev/loop872\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 873,\n \"path\": \"/dev/loop873\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 874,\n \"path\": \"/dev/loop874\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 875,\n \"path\": \"/dev/loop875\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 876,\n \"path\": \"/dev/loop876\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 877,\n \"path\": \"/dev/loop877\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 878,\n \"path\": \"/dev/loop878\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 879,\n \"path\": \"/dev/loop879\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 880,\n \"path\": \"/dev/loop880\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 881,\n \"path\": \"/dev/loop881\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 882,\n \"path\": \"/dev/loop882\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 883,\n \"path\": \"/dev/loop883\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 884,\n \"path\": \"/dev/loop884\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 885,\n \"path\": \"/dev/loop885\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 886,\n \"path\": \"/dev/loop886\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 887,\n \"path\": \"/dev/loop887\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 888,\n \"path\": \"/dev/loop888\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 889,\n \"path\": \"/dev/loop889\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 890,\n \"path\": \"/dev/loop890\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 891,\n \"path\": \"/dev/loop891\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 892,\n \"path\": \"/dev/loop892\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 893,\n \"path\": \"/dev/loop893\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 894,\n \"path\": \"/dev/loop894\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 895,\n \"path\": \"/dev/loop895\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 896,\n \"path\": \"/dev/loop896\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 897,\n \"path\": \"/dev/loop897\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 898,\n \"path\": \"/dev/loop898\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 899,\n \"path\": \"/dev/loop899\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 900,\n \"path\": \"/dev/loop900\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 901,\n \"path\": \"/dev/loop901\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 902,\n \"path\": \"/dev/loop902\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 903,\n \"path\": \"/dev/loop903\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 904,\n \"path\": \"/dev/loop904\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 905,\n \"path\": \"/dev/loop905\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 906,\n \"path\": \"/dev/loop906\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 907,\n \"path\": \"/dev/loop907\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 908,\n \"path\": \"/dev/loop908\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 909,\n \"path\": \"/dev/loop909\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 910,\n \"path\": \"/dev/loop910\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 911,\n \"path\": \"/dev/loop911\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 912,\n \"path\": \"/dev/loop912\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 913,\n \"path\": \"/dev/loop913\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 914,\n \"path\": \"/dev/loop914\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 915,\n \"path\": \"/dev/loop915\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 916,\n \"path\": \"/dev/loop916\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 917,\n \"path\": \"/dev/loop917\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 918,\n \"path\": \"/dev/loop918\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 919,\n \"path\": \"/dev/loop919\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 920,\n \"path\": \"/dev/loop920\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 921,\n \"path\": \"/dev/loop921\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 922,\n \"path\": \"/dev/loop922\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 923,\n \"path\": \"/dev/loop923\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 924,\n \"path\": \"/dev/loop924\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 925,\n \"path\": \"/dev/loop925\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 926,\n \"path\": \"/dev/loop926\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 927,\n \"path\": \"/dev/loop927\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 928,\n \"path\": \"/dev/loop928\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 929,\n \"path\": \"/dev/loop929\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 930,\n \"path\": \"/dev/loop930\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 931,\n \"path\": \"/dev/loop931\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 932,\n \"path\": \"/dev/loop932\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 933,\n \"path\": \"/dev/loop933\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 934,\n \"path\": \"/dev/loop934\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 935,\n \"path\": \"/dev/loop935\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 936,\n \"path\": \"/dev/loop936\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 937,\n \"path\": \"/dev/loop937\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 938,\n \"path\": \"/dev/loop938\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 939,\n \"path\": \"/dev/loop939\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 940,\n \"path\": \"/dev/loop940\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 941,\n \"path\": \"/dev/loop941\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 942,\n \"path\": \"/dev/loop942\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 943,\n \"path\": \"/dev/loop943\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 944,\n \"path\": \"/dev/loop944\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 945,\n \"path\": \"/dev/loop945\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 946,\n \"path\": \"/dev/loop946\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 947,\n \"path\": \"/dev/loop947\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 948,\n \"path\": \"/dev/loop948\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 949,\n \"path\": \"/dev/loop949\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 950,\n \"path\": \"/dev/loop950\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 951,\n \"path\": \"/dev/loop951\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 952,\n \"path\": \"/dev/loop952\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 953,\n \"path\": \"/dev/loop953\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 954,\n \"path\": \"/dev/loop954\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 955,\n \"path\": \"/dev/loop955\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 956,\n \"path\": \"/dev/loop956\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 957,\n \"path\": \"/dev/loop957\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 958,\n \"path\": \"/dev/loop958\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 959,\n \"path\": \"/dev/loop959\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 960,\n \"path\": \"/dev/loop960\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 961,\n \"path\": \"/dev/loop961\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 962,\n \"path\": \"/dev/loop962\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 963,\n \"path\": \"/dev/loop963\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 964,\n \"path\": \"/dev/loop964\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 965,\n \"path\": \"/dev/loop965\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 966,\n \"path\": \"/dev/loop966\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 967,\n \"path\": \"/dev/loop967\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 968,\n \"path\": \"/dev/loop968\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 969,\n \"path\": \"/dev/loop969\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 970,\n \"path\": \"/dev/loop970\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 971,\n \"path\": \"/dev/loop971\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 972,\n \"path\": \"/dev/loop972\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 973,\n \"path\": \"/dev/loop973\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 974,\n \"path\": \"/dev/loop974\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 975,\n \"path\": \"/dev/loop975\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 976,\n \"path\": \"/dev/loop976\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 977,\n \"path\": \"/dev/loop977\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 978,\n \"path\": \"/dev/loop978\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 979,\n \"path\": \"/dev/loop979\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 980,\n \"path\": \"/dev/loop980\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 981,\n \"path\": \"/dev/loop981\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 982,\n \"path\": \"/dev/loop982\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 983,\n \"path\": \"/dev/loop983\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 984,\n \"path\": \"/dev/loop984\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 985,\n \"path\": \"/dev/loop985\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 986,\n \"path\": \"/dev/loop986\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 987,\n \"path\": \"/dev/loop987\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 988,\n \"path\": \"/dev/loop988\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 989,\n \"path\": \"/dev/loop989\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 990,\n \"path\": \"/dev/loop990\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 991,\n \"path\": \"/dev/loop991\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 992,\n \"path\": \"/dev/loop992\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 993,\n \"path\": \"/dev/loop993\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 994,\n \"path\": \"/dev/loop994\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 995,\n \"path\": \"/dev/loop995\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 996,\n \"path\": \"/dev/loop996\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 997,\n \"path\": \"/dev/loop997\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 998,\n \"path\": \"/dev/loop998\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 999,\n \"path\": \"/dev/loop999\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"path\": \"/proc/956336/ns/pid\",\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/956336/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/956336/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/956336/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/proc\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/host\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/run/systemd/\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/run/systemd\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/containers/cluster-tools/83249830\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/volumes/kubernetes.io~projected/kube-api-access-v8xwf\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v131-worker2\",\n \"CRI_VERSION=v1.32.0\",\n \"RUNC_VERSION=v1.2.6\",\n \"NCTL_VERSION=2.0.4\",\n \"CTR_VERSION=2.0.4\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732\",\n \"snapshotKey\": \"1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-19T23:12:54.579361108Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/lfncnti/cluster-tools:v1.0.8\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-crvg8\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_cluster-tools-crvg8_90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/cluster-tools/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/run/systemd/\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/systemd\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/proc\",\n \"gidMappings\": [],\n \"hostPath\": \"/proc\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/host\",\n \"gidMappings\": [],\n \"hostPath\": \"/\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/volumes/kubernetes.io~projected/kube-api-access-v8xwf\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/containers/cluster-tools/83249830\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:12:54.9631863Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:56Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:56Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:57] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" } ], "image": { "image": "sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f", "user_specified_image": "lfncnti/cluster-tools:v1.0.8" }, "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-crvg8", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 2 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "cluster-tools/0.log", "metadata": { "name": "cluster-tools" }, "mounts": [ { "container_path": "/run/systemd/", "host_path": "/run/systemd", "readonly": true }, { "container_path": "/proc", "host_path": "/proc" }, { "container_path": "/host", "host_path": "/" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/volumes/kubernetes.io~projected/kube-api-access-v8xwf", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/containers/cluster-tools/83249830" } ] }, "pid": 956360, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "cluster-tools", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "lfncnti/cluster-tools:v1.0.8", "io.kubernetes.cri.sandbox-id": "ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732", "io.kubernetes.cri.sandbox-name": "cluster-tools-crvg8", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod90c12a6b_a11a_4a43_ad7c_b4169cd5a2ee.slice:cri-containerd:1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 1000, "path": "/dev/loop1000", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 128, "path": "/dev/loop128", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 129, "path": "/dev/loop129", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 130, "path": "/dev/loop130", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 131, "path": "/dev/loop131", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 132, "path": "/dev/loop132", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 133, "path": "/dev/loop133", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 134, "path": "/dev/loop134", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 135, "path": "/dev/loop135", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 136, "path": "/dev/loop136", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 137, "path": "/dev/loop137", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 138, "path": "/dev/loop138", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 139, "path": "/dev/loop139", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 140, "path": "/dev/loop140", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 141, "path": "/dev/loop141", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 142, "path": "/dev/loop142", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 143, "path": "/dev/loop143", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 144, "path": "/dev/loop144", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 145, "path": "/dev/loop145", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 146, "path": "/dev/loop146", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 147, "path": "/dev/loop147", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 148, "path": "/dev/loop148", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 149, "path": "/dev/loop149", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 150, "path": "/dev/loop150", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 151, "path": "/dev/loop151", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 152, "path": "/dev/loop152", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 153, "path": "/dev/loop153", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 154, "path": "/dev/loop154", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 155, "path": "/dev/loop155", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 156, "path": "/dev/loop156", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 157, "path": "/dev/loop157", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 158, "path": "/dev/loop158", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 159, "path": "/dev/loop159", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 160, "path": "/dev/loop160", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 161, "path": "/dev/loop161", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 162, "path": "/dev/loop162", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 163, "path": "/dev/loop163", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 164, "path": "/dev/loop164", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 165, "path": "/dev/loop165", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 166, "path": "/dev/loop166", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 167, "path": "/dev/loop167", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 168, "path": "/dev/loop168", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 169, "path": "/dev/loop169", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 170, "path": "/dev/loop170", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 171, "path": "/dev/loop171", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 172, "path": "/dev/loop172", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 173, "path": "/dev/loop173", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 174, "path": "/dev/loop174", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 175, "path": "/dev/loop175", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 176, "path": "/dev/loop176", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 177, "path": "/dev/loop177", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 178, "path": "/dev/loop178", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 179, "path": "/dev/loop179", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 180, "path": "/dev/loop180", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 181, "path": "/dev/loop181", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 182, "path": "/dev/loop182", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 183, "path": "/dev/loop183", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 184, "path": "/dev/loop184", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 185, "path": "/dev/loop185", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 186, "path": "/dev/loop186", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 187, "path": "/dev/loop187", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 188, "path": "/dev/loop188", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 189, "path": "/dev/loop189", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 190, "path": "/dev/loop190", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 191, "path": "/dev/loop191", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 192, "path": "/dev/loop192", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 193, "path": "/dev/loop193", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 194, "path": "/dev/loop194", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 195, "path": "/dev/loop195", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 196, "path": "/dev/loop196", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 197, "path": "/dev/loop197", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 198, "path": "/dev/loop198", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 199, "path": "/dev/loop199", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 200, "path": "/dev/loop200", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 201, "path": "/dev/loop201", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 202, "path": "/dev/loop202", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 203, "path": "/dev/loop203", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 204, "path": "/dev/loop204", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 205, "path": "/dev/loop205", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 206, "path": "/dev/loop206", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 207, "path": "/dev/loop207", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 208, "path": "/dev/loop208", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 209, "path": "/dev/loop209", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 210, "path": "/dev/loop210", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 211, "path": "/dev/loop211", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 212, "path": "/dev/loop212", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 213, "path": "/dev/loop213", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 214, "path": "/dev/loop214", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 215, "path": "/dev/loop215", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 216, "path": "/dev/loop216", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 217, "path": "/dev/loop217", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 218, "path": "/dev/loop218", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 219, "path": "/dev/loop219", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 220, "path": "/dev/loop220", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 221, "path": "/dev/loop221", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 222, "path": "/dev/loop222", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 223, "path": "/dev/loop223", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 224, "path": "/dev/loop224", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 225, "path": "/dev/loop225", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 226, "path": "/dev/loop226", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 227, "path": "/dev/loop227", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 228, "path": "/dev/loop228", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 229, "path": "/dev/loop229", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 230, "path": "/dev/loop230", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 231, "path": "/dev/loop231", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 232, "path": "/dev/loop232", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 233, "path": "/dev/loop233", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 234, "path": "/dev/loop234", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 235, "path": "/dev/loop235", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 236, "path": "/dev/loop236", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 237, "path": "/dev/loop237", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 238, "path": "/dev/loop238", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 239, "path": "/dev/loop239", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 240, "path": "/dev/loop240", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 241, "path": "/dev/loop241", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 242, "path": "/dev/loop242", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 243, "path": "/dev/loop243", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 244, "path": "/dev/loop244", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 245, "path": "/dev/loop245", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 246, "path": "/dev/loop246", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 247, "path": "/dev/loop247", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 248, "path": "/dev/loop248", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 249, "path": "/dev/loop249", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 250, "path": "/dev/loop250", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 251, "path": "/dev/loop251", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 252, "path": "/dev/loop252", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 253, "path": "/dev/loop253", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 254, "path": "/dev/loop254", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 255, "path": "/dev/loop255", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 256, "path": "/dev/loop256", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 257, "path": "/dev/loop257", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 258, "path": "/dev/loop258", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 259, "path": "/dev/loop259", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 260, "path": "/dev/loop260", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 261, "path": "/dev/loop261", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 262, "path": "/dev/loop262", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 263, "path": "/dev/loop263", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 264, "path": "/dev/loop264", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 265, "path": "/dev/loop265", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 266, "path": "/dev/loop266", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 267, "path": "/dev/loop267", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 268, "path": "/dev/loop268", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 269, "path": "/dev/loop269", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 270, "path": "/dev/loop270", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 271, "path": "/dev/loop271", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 272, "path": "/dev/loop272", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 273, "path": "/dev/loop273", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 274, "path": "/dev/loop274", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 275, "path": "/dev/loop275", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 276, "path": "/dev/loop276", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 277, "path": "/dev/loop277", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 278, "path": "/dev/loop278", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 279, "path": "/dev/loop279", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 280, "path": "/dev/loop280", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 281, "path": "/dev/loop281", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 282, "path": "/dev/loop282", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 283, "path": "/dev/loop283", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 284, "path": "/dev/loop284", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 285, "path": "/dev/loop285", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 286, "path": "/dev/loop286", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 287, "path": "/dev/loop287", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 288, "path": "/dev/loop288", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 289, "path": "/dev/loop289", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 290, "path": "/dev/loop290", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 291, "path": "/dev/loop291", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 292, "path": "/dev/loop292", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 293, "path": "/dev/loop293", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 294, "path": "/dev/loop294", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 295, "path": "/dev/loop295", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 296, "path": "/dev/loop296", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 297, "path": "/dev/loop297", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 298, "path": "/dev/loop298", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 299, "path": "/dev/loop299", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 300, "path": "/dev/loop300", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 301, "path": "/dev/loop301", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 302, "path": "/dev/loop302", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 303, "path": "/dev/loop303", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 304, "path": "/dev/loop304", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 305, "path": "/dev/loop305", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 306, "path": "/dev/loop306", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 307, "path": "/dev/loop307", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 308, "path": "/dev/loop308", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 309, "path": "/dev/loop309", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 310, "path": "/dev/loop310", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 311, "path": "/dev/loop311", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 312, "path": "/dev/loop312", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 313, "path": "/dev/loop313", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 314, "path": "/dev/loop314", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 315, "path": "/dev/loop315", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 316, "path": "/dev/loop316", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 317, "path": "/dev/loop317", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 318, "path": "/dev/loop318", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 319, "path": "/dev/loop319", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 320, "path": "/dev/loop320", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 321, "path": "/dev/loop321", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 322, "path": "/dev/loop322", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 323, "path": "/dev/loop323", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 324, "path": "/dev/loop324", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 325, "path": "/dev/loop325", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 326, "path": "/dev/loop326", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 327, "path": "/dev/loop327", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 328, "path": "/dev/loop328", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 329, "path": "/dev/loop329", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 330, "path": "/dev/loop330", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 331, "path": "/dev/loop331", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 332, "path": "/dev/loop332", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 333, "path": "/dev/loop333", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 334, "path": "/dev/loop334", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 335, "path": "/dev/loop335", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 336, "path": "/dev/loop336", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 337, "path": "/dev/loop337", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 338, "path": "/dev/loop338", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 339, "path": "/dev/loop339", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 340, "path": "/dev/loop340", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 341, "path": "/dev/loop341", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 342, "path": "/dev/loop342", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 343, "path": "/dev/loop343", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 344, "path": "/dev/loop344", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 345, "path": "/dev/loop345", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 346, "path": "/dev/loop346", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 347, "path": "/dev/loop347", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 348, "path": "/dev/loop348", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 349, "path": "/dev/loop349", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 350, "path": "/dev/loop350", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 351, "path": "/dev/loop351", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 352, "path": "/dev/loop352", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 353, "path": "/dev/loop353", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 354, "path": "/dev/loop354", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 355, "path": "/dev/loop355", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 356, "path": "/dev/loop356", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 357, "path": "/dev/loop357", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 358, "path": "/dev/loop358", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 359, "path": "/dev/loop359", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 360, "path": "/dev/loop360", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 361, "path": "/dev/loop361", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 362, "path": "/dev/loop362", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 363, "path": "/dev/loop363", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 364, "path": "/dev/loop364", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 365, "path": "/dev/loop365", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 366, "path": "/dev/loop366", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 367, "path": "/dev/loop367", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 368, "path": "/dev/loop368", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 369, "path": "/dev/loop369", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 370, "path": "/dev/loop370", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 371, "path": "/dev/loop371", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 372, "path": "/dev/loop372", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 373, "path": "/dev/loop373", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 374, "path": "/dev/loop374", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 375, "path": "/dev/loop375", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 376, "path": "/dev/loop376", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 377, "path": "/dev/loop377", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 378, "path": "/dev/loop378", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 379, "path": "/dev/loop379", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 380, "path": "/dev/loop380", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 381, "path": "/dev/loop381", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 382, "path": "/dev/loop382", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 383, "path": "/dev/loop383", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 384, "path": "/dev/loop384", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 385, "path": "/dev/loop385", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 386, "path": "/dev/loop386", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 387, "path": "/dev/loop387", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 388, "path": "/dev/loop388", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 389, "path": "/dev/loop389", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 390, "path": "/dev/loop390", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 391, "path": "/dev/loop391", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 392, "path": "/dev/loop392", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 393, "path": "/dev/loop393", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 394, "path": "/dev/loop394", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 395, "path": "/dev/loop395", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 396, "path": "/dev/loop396", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 397, "path": "/dev/loop397", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 398, "path": "/dev/loop398", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 399, "path": "/dev/loop399", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 400, "path": "/dev/loop400", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 401, "path": "/dev/loop401", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 402, "path": "/dev/loop402", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 403, "path": "/dev/loop403", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 404, "path": "/dev/loop404", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 405, "path": "/dev/loop405", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 406, "path": "/dev/loop406", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 407, "path": "/dev/loop407", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 408, "path": "/dev/loop408", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 409, "path": "/dev/loop409", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 410, "path": "/dev/loop410", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 411, "path": "/dev/loop411", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 412, "path": "/dev/loop412", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 413, "path": "/dev/loop413", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 414, "path": "/dev/loop414", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 415, "path": "/dev/loop415", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 416, "path": "/dev/loop416", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 417, "path": "/dev/loop417", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 418, "path": "/dev/loop418", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 419, "path": "/dev/loop419", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 420, "path": "/dev/loop420", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 421, "path": "/dev/loop421", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 422, "path": "/dev/loop422", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 423, "path": "/dev/loop423", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 424, "path": "/dev/loop424", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 425, "path": "/dev/loop425", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 426, "path": "/dev/loop426", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 427, "path": "/dev/loop427", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 428, "path": "/dev/loop428", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 429, "path": "/dev/loop429", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 430, "path": "/dev/loop430", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 431, "path": "/dev/loop431", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 432, "path": "/dev/loop432", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 433, "path": "/dev/loop433", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 434, "path": "/dev/loop434", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 435, "path": "/dev/loop435", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 436, "path": "/dev/loop436", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 437, "path": "/dev/loop437", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 438, "path": "/dev/loop438", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 439, "path": "/dev/loop439", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 440, "path": "/dev/loop440", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 441, "path": "/dev/loop441", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 442, "path": "/dev/loop442", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 443, "path": "/dev/loop443", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 444, "path": "/dev/loop444", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 445, "path": "/dev/loop445", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 446, "path": "/dev/loop446", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 447, "path": "/dev/loop447", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 448, "path": "/dev/loop448", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 449, "path": "/dev/loop449", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 450, "path": "/dev/loop450", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 451, "path": "/dev/loop451", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 452, "path": "/dev/loop452", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 453, "path": "/dev/loop453", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 454, "path": "/dev/loop454", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 455, "path": "/dev/loop455", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 456, "path": "/dev/loop456", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 457, "path": "/dev/loop457", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 458, "path": "/dev/loop458", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 459, "path": "/dev/loop459", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 460, "path": "/dev/loop460", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 461, "path": "/dev/loop461", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 462, "path": "/dev/loop462", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 463, "path": "/dev/loop463", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 464, "path": "/dev/loop464", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 465, "path": "/dev/loop465", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 466, "path": "/dev/loop466", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 467, "path": "/dev/loop467", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 468, "path": "/dev/loop468", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 469, "path": "/dev/loop469", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 470, "path": "/dev/loop470", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 471, "path": "/dev/loop471", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 472, "path": "/dev/loop472", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 473, "path": "/dev/loop473", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 474, "path": "/dev/loop474", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 475, "path": "/dev/loop475", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 476, "path": "/dev/loop476", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 477, "path": "/dev/loop477", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 478, "path": "/dev/loop478", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 479, "path": "/dev/loop479", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 480, "path": "/dev/loop480", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 481, "path": "/dev/loop481", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 482, "path": "/dev/loop482", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 483, "path": "/dev/loop483", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 484, "path": "/dev/loop484", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 485, "path": "/dev/loop485", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 486, "path": "/dev/loop486", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 487, "path": "/dev/loop487", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 488, "path": "/dev/loop488", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 489, "path": "/dev/loop489", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 490, "path": "/dev/loop490", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 491, "path": "/dev/loop491", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 492, "path": "/dev/loop492", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 493, "path": "/dev/loop493", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 494, "path": "/dev/loop494", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 495, "path": "/dev/loop495", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 496, "path": "/dev/loop496", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 497, "path": "/dev/loop497", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 498, "path": "/dev/loop498", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 499, "path": "/dev/loop499", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 500, "path": "/dev/loop500", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 501, "path": "/dev/loop501", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 502, "path": "/dev/loop502", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 503, "path": "/dev/loop503", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 504, "path": "/dev/loop504", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 505, "path": "/dev/loop505", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 506, "path": "/dev/loop506", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 507, "path": "/dev/loop507", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 508, "path": "/dev/loop508", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 509, "path": "/dev/loop509", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 510, "path": "/dev/loop510", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 511, "path": "/dev/loop511", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 512, "path": "/dev/loop512", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 513, "path": "/dev/loop513", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 514, "path": "/dev/loop514", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 515, "path": "/dev/loop515", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 516, "path": "/dev/loop516", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 517, "path": "/dev/loop517", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 518, "path": "/dev/loop518", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 519, "path": "/dev/loop519", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 520, "path": "/dev/loop520", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 521, "path": "/dev/loop521", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 522, "path": "/dev/loop522", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 523, "path": "/dev/loop523", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 524, "path": "/dev/loop524", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 525, "path": "/dev/loop525", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 526, "path": "/dev/loop526", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 527, "path": "/dev/loop527", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 528, "path": "/dev/loop528", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 529, "path": "/dev/loop529", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 530, "path": "/dev/loop530", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 531, "path": "/dev/loop531", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 532, "path": "/dev/loop532", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 533, "path": "/dev/loop533", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 534, "path": "/dev/loop534", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 535, "path": "/dev/loop535", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 536, "path": "/dev/loop536", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 537, "path": "/dev/loop537", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 538, "path": "/dev/loop538", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 539, "path": "/dev/loop539", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 540, "path": "/dev/loop540", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 541, "path": "/dev/loop541", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 542, "path": "/dev/loop542", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 543, "path": "/dev/loop543", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 544, "path": "/dev/loop544", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 545, "path": "/dev/loop545", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 546, "path": "/dev/loop546", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 547, "path": "/dev/loop547", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 548, "path": "/dev/loop548", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 549, "path": "/dev/loop549", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 550, "path": "/dev/loop550", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 551, "path": "/dev/loop551", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 552, "path": "/dev/loop552", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 553, "path": "/dev/loop553", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 554, "path": "/dev/loop554", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 555, "path": "/dev/loop555", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 556, "path": "/dev/loop556", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 557, "path": "/dev/loop557", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 558, "path": "/dev/loop558", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 559, "path": "/dev/loop559", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 560, "path": "/dev/loop560", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 561, "path": "/dev/loop561", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 562, "path": "/dev/loop562", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 563, "path": "/dev/loop563", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 564, "path": "/dev/loop564", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 565, "path": "/dev/loop565", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 566, "path": "/dev/loop566", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 567, "path": "/dev/loop567", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 568, "path": "/dev/loop568", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 569, "path": "/dev/loop569", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 570, "path": "/dev/loop570", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 571, "path": "/dev/loop571", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 572, "path": "/dev/loop572", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 573, "path": "/dev/loop573", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 574, "path": "/dev/loop574", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 575, "path": "/dev/loop575", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 576, "path": "/dev/loop576", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 577, "path": "/dev/loop577", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 578, "path": "/dev/loop578", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 579, "path": "/dev/loop579", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 580, "path": "/dev/loop580", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 581, "path": "/dev/loop581", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 582, "path": "/dev/loop582", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 583, "path": "/dev/loop583", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 584, "path": "/dev/loop584", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 585, "path": "/dev/loop585", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 586, "path": "/dev/loop586", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 587, "path": "/dev/loop587", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 588, "path": "/dev/loop588", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 589, "path": "/dev/loop589", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 590, "path": "/dev/loop590", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 591, "path": "/dev/loop591", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 592, "path": "/dev/loop592", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 593, "path": "/dev/loop593", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 594, "path": "/dev/loop594", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 595, "path": "/dev/loop595", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 596, "path": "/dev/loop596", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 597, "path": "/dev/loop597", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 598, "path": "/dev/loop598", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 599, "path": "/dev/loop599", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 600, "path": "/dev/loop600", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 601, "path": "/dev/loop601", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 602, "path": "/dev/loop602", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 603, "path": "/dev/loop603", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 604, "path": "/dev/loop604", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 605, "path": "/dev/loop605", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 606, "path": "/dev/loop606", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 607, "path": "/dev/loop607", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 608, "path": "/dev/loop608", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 609, "path": "/dev/loop609", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 610, "path": "/dev/loop610", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 611, "path": "/dev/loop611", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 612, "path": "/dev/loop612", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 613, "path": "/dev/loop613", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 614, "path": "/dev/loop614", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 615, "path": "/dev/loop615", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 616, "path": "/dev/loop616", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 617, "path": "/dev/loop617", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 618, "path": "/dev/loop618", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 619, "path": "/dev/loop619", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 620, "path": "/dev/loop620", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 621, "path": "/dev/loop621", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 622, "path": "/dev/loop622", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 623, "path": "/dev/loop623", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 624, "path": "/dev/loop624", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 625, "path": "/dev/loop625", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 626, "path": "/dev/loop626", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 627, "path": "/dev/loop627", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 628, "path": "/dev/loop628", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 629, "path": "/dev/loop629", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 630, "path": "/dev/loop630", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 631, "path": "/dev/loop631", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 632, "path": "/dev/loop632", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 633, "path": "/dev/loop633", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 634, "path": "/dev/loop634", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 635, "path": "/dev/loop635", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 636, "path": "/dev/loop636", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 637, "path": "/dev/loop637", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 638, "path": "/dev/loop638", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 639, "path": "/dev/loop639", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 640, "path": "/dev/loop640", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 641, "path": "/dev/loop641", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 642, "path": "/dev/loop642", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 643, "path": "/dev/loop643", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 644, "path": "/dev/loop644", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 645, "path": "/dev/loop645", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 646, "path": "/dev/loop646", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 647, "path": "/dev/loop647", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 648, "path": "/dev/loop648", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 649, "path": "/dev/loop649", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 650, "path": "/dev/loop650", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 651, "path": "/dev/loop651", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 652, "path": "/dev/loop652", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 653, "path": "/dev/loop653", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 654, "path": "/dev/loop654", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 655, "path": "/dev/loop655", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 656, "path": "/dev/loop656", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 657, "path": "/dev/loop657", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 658, "path": "/dev/loop658", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 659, "path": "/dev/loop659", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 660, "path": "/dev/loop660", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 661, "path": "/dev/loop661", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 662, "path": "/dev/loop662", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 663, "path": "/dev/loop663", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 664, "path": "/dev/loop664", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 665, "path": "/dev/loop665", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 666, "path": "/dev/loop666", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 667, "path": "/dev/loop667", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 668, "path": "/dev/loop668", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 669, "path": "/dev/loop669", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 670, "path": "/dev/loop670", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 671, "path": "/dev/loop671", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 672, "path": "/dev/loop672", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 673, "path": "/dev/loop673", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 674, "path": "/dev/loop674", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 675, "path": "/dev/loop675", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 676, "path": "/dev/loop676", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 677, "path": "/dev/loop677", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 678, "path": "/dev/loop678", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 679, "path": "/dev/loop679", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 680, "path": "/dev/loop680", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 681, "path": "/dev/loop681", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 682, "path": "/dev/loop682", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 683, "path": "/dev/loop683", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 684, "path": "/dev/loop684", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 685, "path": "/dev/loop685", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 686, "path": "/dev/loop686", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 687, "path": "/dev/loop687", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 688, "path": "/dev/loop688", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 689, "path": "/dev/loop689", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 690, "path": "/dev/loop690", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 691, "path": "/dev/loop691", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 692, "path": "/dev/loop692", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 693, "path": "/dev/loop693", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 694, "path": "/dev/loop694", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 695, "path": "/dev/loop695", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 696, "path": "/dev/loop696", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 697, "path": "/dev/loop697", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 698, "path": "/dev/loop698", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 699, "path": "/dev/loop699", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 700, "path": "/dev/loop700", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 701, "path": "/dev/loop701", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 702, "path": "/dev/loop702", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 703, "path": "/dev/loop703", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 704, "path": "/dev/loop704", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 705, "path": "/dev/loop705", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 706, "path": "/dev/loop706", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 707, "path": "/dev/loop707", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 708, "path": "/dev/loop708", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 709, "path": "/dev/loop709", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 710, "path": "/dev/loop710", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 711, "path": "/dev/loop711", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 712, "path": "/dev/loop712", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 713, "path": "/dev/loop713", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 714, "path": "/dev/loop714", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 715, "path": "/dev/loop715", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 716, "path": "/dev/loop716", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 717, "path": "/dev/loop717", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 718, "path": "/dev/loop718", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 719, "path": "/dev/loop719", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 720, "path": "/dev/loop720", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 721, "path": "/dev/loop721", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 722, "path": "/dev/loop722", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 723, "path": "/dev/loop723", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 724, "path": "/dev/loop724", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 725, "path": "/dev/loop725", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 726, "path": "/dev/loop726", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 727, "path": "/dev/loop727", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 728, "path": "/dev/loop728", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 729, "path": "/dev/loop729", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 730, "path": "/dev/loop730", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 731, "path": "/dev/loop731", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 732, "path": "/dev/loop732", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 733, "path": "/dev/loop733", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 734, "path": "/dev/loop734", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 735, "path": "/dev/loop735", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 736, "path": "/dev/loop736", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 737, "path": "/dev/loop737", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 738, "path": "/dev/loop738", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 739, "path": "/dev/loop739", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 740, "path": "/dev/loop740", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 741, "path": "/dev/loop741", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 742, "path": "/dev/loop742", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 743, "path": "/dev/loop743", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 744, "path": "/dev/loop744", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 745, "path": "/dev/loop745", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 746, "path": "/dev/loop746", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 747, "path": "/dev/loop747", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 748, "path": "/dev/loop748", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 749, "path": "/dev/loop749", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 750, "path": "/dev/loop750", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 751, "path": "/dev/loop751", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 752, "path": "/dev/loop752", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 753, "path": "/dev/loop753", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 754, "path": "/dev/loop754", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 755, "path": "/dev/loop755", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 756, "path": "/dev/loop756", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 757, "path": "/dev/loop757", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 758, "path": "/dev/loop758", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 759, "path": "/dev/loop759", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 760, "path": "/dev/loop760", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 761, "path": "/dev/loop761", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 762, "path": "/dev/loop762", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 763, "path": "/dev/loop763", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 764, "path": "/dev/loop764", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 765, "path": "/dev/loop765", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 766, "path": "/dev/loop766", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 767, "path": "/dev/loop767", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 768, "path": "/dev/loop768", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 769, "path": "/dev/loop769", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 770, "path": "/dev/loop770", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 771, "path": "/dev/loop771", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 772, "path": "/dev/loop772", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 773, "path": "/dev/loop773", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 774, "path": "/dev/loop774", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 775, "path": "/dev/loop775", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 776, "path": "/dev/loop776", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 777, "path": "/dev/loop777", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 778, "path": "/dev/loop778", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 779, "path": "/dev/loop779", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 780, "path": "/dev/loop780", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 781, "path": "/dev/loop781", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 782, "path": "/dev/loop782", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 783, "path": "/dev/loop783", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 784, "path": "/dev/loop784", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 785, "path": "/dev/loop785", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 786, "path": "/dev/loop786", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 787, "path": "/dev/loop787", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 788, "path": "/dev/loop788", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 789, "path": "/dev/loop789", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 790, "path": "/dev/loop790", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 791, "path": "/dev/loop791", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 792, "path": "/dev/loop792", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 793, "path": "/dev/loop793", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 794, "path": "/dev/loop794", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 795, "path": "/dev/loop795", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 796, "path": "/dev/loop796", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 797, "path": "/dev/loop797", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 798, "path": "/dev/loop798", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 799, "path": "/dev/loop799", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 800, "path": "/dev/loop800", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 801, "path": "/dev/loop801", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 802, "path": "/dev/loop802", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 803, "path": "/dev/loop803", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 804, "path": "/dev/loop804", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 805, "path": "/dev/loop805", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 806, "path": "/dev/loop806", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 807, "path": "/dev/loop807", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 808, "path": "/dev/loop808", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 809, "path": "/dev/loop809", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 810, "path": "/dev/loop810", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 811, "path": "/dev/loop811", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 812, "path": "/dev/loop812", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 813, "path": "/dev/loop813", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 814, "path": "/dev/loop814", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 815, "path": "/dev/loop815", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 816, "path": "/dev/loop816", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 817, "path": "/dev/loop817", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 818, "path": "/dev/loop818", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 819, "path": "/dev/loop819", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 820, "path": "/dev/loop820", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 821, "path": "/dev/loop821", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 822, "path": "/dev/loop822", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 823, "path": "/dev/loop823", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 824, "path": "/dev/loop824", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 825, "path": "/dev/loop825", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 826, "path": "/dev/loop826", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 827, "path": "/dev/loop827", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 828, "path": "/dev/loop828", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 829, "path": "/dev/loop829", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 830, "path": "/dev/loop830", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 831, "path": "/dev/loop831", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 832, "path": "/dev/loop832", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 833, "path": "/dev/loop833", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 834, "path": "/dev/loop834", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 835, "path": "/dev/loop835", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 836, "path": "/dev/loop836", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 837, "path": "/dev/loop837", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 838, "path": "/dev/loop838", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 839, "path": "/dev/loop839", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 840, "path": "/dev/loop840", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 841, "path": "/dev/loop841", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 842, "path": "/dev/loop842", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 843, "path": "/dev/loop843", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 844, "path": "/dev/loop844", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 845, "path": "/dev/loop845", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 846, "path": "/dev/loop846", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 847, "path": "/dev/loop847", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 848, "path": "/dev/loop848", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 849, "path": "/dev/loop849", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 850, "path": "/dev/loop850", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 851, "path": "/dev/loop851", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 852, "path": "/dev/loop852", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 853, "path": "/dev/loop853", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 854, "path": "/dev/loop854", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 855, "path": "/dev/loop855", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 856, "path": "/dev/loop856", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 857, "path": "/dev/loop857", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 858, "path": "/dev/loop858", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 859, "path": "/dev/loop859", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 860, "path": "/dev/loop860", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 861, "path": "/dev/loop861", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 862, "path": "/dev/loop862", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 863, "path": "/dev/loop863", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 864, "path": "/dev/loop864", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 865, "path": "/dev/loop865", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 866, "path": "/dev/loop866", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 867, "path": "/dev/loop867", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 868, "path": "/dev/loop868", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 869, "path": "/dev/loop869", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 870, "path": "/dev/loop870", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 871, "path": "/dev/loop871", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 872, "path": "/dev/loop872", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 873, "path": "/dev/loop873", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 874, "path": "/dev/loop874", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 875, "path": "/dev/loop875", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 876, "path": "/dev/loop876", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 877, "path": "/dev/loop877", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 878, "path": "/dev/loop878", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 879, "path": "/dev/loop879", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 880, "path": "/dev/loop880", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 881, "path": "/dev/loop881", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 882, "path": "/dev/loop882", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 883, "path": "/dev/loop883", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 884, "path": "/dev/loop884", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 885, "path": "/dev/loop885", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 886, "path": "/dev/loop886", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 887, "path": "/dev/loop887", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 888, "path": "/dev/loop888", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 889, "path": "/dev/loop889", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 890, "path": "/dev/loop890", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 891, "path": "/dev/loop891", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 892, "path": "/dev/loop892", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 893, "path": "/dev/loop893", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 894, "path": "/dev/loop894", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 895, "path": "/dev/loop895", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 896, "path": "/dev/loop896", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 897, "path": "/dev/loop897", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 898, "path": "/dev/loop898", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 899, "path": "/dev/loop899", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 900, "path": "/dev/loop900", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 901, "path": "/dev/loop901", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 902, "path": "/dev/loop902", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 903, "path": "/dev/loop903", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 904, "path": "/dev/loop904", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 905, "path": "/dev/loop905", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 906, "path": "/dev/loop906", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 907, "path": "/dev/loop907", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 908, "path": "/dev/loop908", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 909, "path": "/dev/loop909", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 910, "path": "/dev/loop910", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 911, "path": "/dev/loop911", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 912, "path": "/dev/loop912", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 913, "path": "/dev/loop913", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 914, "path": "/dev/loop914", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 915, "path": "/dev/loop915", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 916, "path": "/dev/loop916", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 917, "path": "/dev/loop917", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 918, "path": "/dev/loop918", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 919, "path": "/dev/loop919", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 920, "path": "/dev/loop920", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 921, "path": "/dev/loop921", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 922, "path": "/dev/loop922", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 923, "path": "/dev/loop923", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 924, "path": "/dev/loop924", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 925, "path": "/dev/loop925", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 926, "path": "/dev/loop926", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 927, "path": "/dev/loop927", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 928, "path": "/dev/loop928", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 929, "path": "/dev/loop929", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 930, "path": "/dev/loop930", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 931, "path": "/dev/loop931", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 932, "path": "/dev/loop932", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 933, "path": "/dev/loop933", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 934, "path": "/dev/loop934", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 935, "path": "/dev/loop935", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 936, "path": "/dev/loop936", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 937, "path": "/dev/loop937", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 938, "path": "/dev/loop938", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 939, "path": "/dev/loop939", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 940, "path": "/dev/loop940", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 941, "path": "/dev/loop941", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 942, "path": "/dev/loop942", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 943, "path": "/dev/loop943", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 944, "path": "/dev/loop944", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 945, "path": "/dev/loop945", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 946, "path": "/dev/loop946", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 947, "path": "/dev/loop947", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 948, "path": "/dev/loop948", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 949, "path": "/dev/loop949", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 950, "path": "/dev/loop950", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 951, "path": "/dev/loop951", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 952, "path": "/dev/loop952", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 953, "path": "/dev/loop953", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 954, "path": "/dev/loop954", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 955, "path": "/dev/loop955", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 956, "path": "/dev/loop956", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 957, "path": "/dev/loop957", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 958, "path": "/dev/loop958", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 959, "path": "/dev/loop959", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 960, "path": "/dev/loop960", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 961, "path": "/dev/loop961", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 962, "path": "/dev/loop962", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 963, "path": "/dev/loop963", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 964, "path": "/dev/loop964", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 965, "path": "/dev/loop965", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 966, "path": "/dev/loop966", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 967, "path": "/dev/loop967", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 968, "path": "/dev/loop968", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 969, "path": "/dev/loop969", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 970, "path": "/dev/loop970", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 971, "path": "/dev/loop971", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 972, "path": "/dev/loop972", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 973, "path": "/dev/loop973", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 974, "path": "/dev/loop974", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 975, "path": "/dev/loop975", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 976, "path": "/dev/loop976", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 977, "path": "/dev/loop977", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 978, "path": "/dev/loop978", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 979, "path": "/dev/loop979", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 980, "path": "/dev/loop980", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 981, "path": "/dev/loop981", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 982, "path": "/dev/loop982", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 983, "path": "/dev/loop983", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 984, "path": "/dev/loop984", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 985, "path": "/dev/loop985", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 986, "path": "/dev/loop986", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 987, "path": "/dev/loop987", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 988, "path": "/dev/loop988", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 989, "path": "/dev/loop989", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 990, "path": "/dev/loop990", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 991, "path": "/dev/loop991", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 992, "path": "/dev/loop992", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 993, "path": "/dev/loop993", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 994, "path": "/dev/loop994", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 995, "path": "/dev/loop995", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 996, "path": "/dev/loop996", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 997, "path": "/dev/loop997", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 998, "path": "/dev/loop998", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 999, "path": "/dev/loop999", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "path": "/proc/956336/ns/pid", "type": "pid" }, { "path": "/proc/956336/ns/ipc", "type": "ipc" }, { "path": "/proc/956336/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/956336/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/proc", "options": [ "rbind", "rprivate", "rw" ], "source": "/proc", "type": "bind" }, { "destination": "/host", "options": [ "rbind", "rprivate", "rw" ], "source": "/", "type": "bind" }, { "destination": "/run/systemd/", "options": [ "rbind", "rprivate", "ro" ], "source": "/run/systemd", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/containers/cluster-tools/83249830", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/volumes/kubernetes.io~projected/kube-api-access-v8xwf", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v131-worker2", "CRI_VERSION=v1.32.0", "RUNC_VERSION=v1.2.6", "NCTL_VERSION=2.0.4", "CTR_VERSION=2.0.4", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "ca59adaa7d7c21a1e111c7100246675327e61db729b44068d910e83aa7f31732", "snapshotKey": "1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-19T23:12:54.579361108Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "1040d047aff1bae18ab3a789109116fc6238b0138c4d14142c71bba940d0aef2", "image": { "annotations": {}, "image": "docker.io/lfncnti/cluster-tools:v1.0.8", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-crvg8", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee" }, "logPath": "/var/log/pods/cnf-testsuite_cluster-tools-crvg8_90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/cluster-tools/0.log", "message": "", "metadata": { "attempt": 0, "name": "cluster-tools" }, "mounts": [ { "containerPath": "/run/systemd/", "gidMappings": [], "hostPath": "/run/systemd", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/proc", "gidMappings": [], "hostPath": "/proc", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/host", "gidMappings": [], "hostPath": "/", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/volumes/kubernetes.io~projected/kube-api-access-v8xwf", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/90c12a6b-a11a-4a43-ad7c-b4169cd5a2ee/containers/cluster-tools/83249830", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-06-19T23:12:54.9631863Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:18:57] INFO -- CNTI: node_pid_by_container_id pid: 956360 [2025-06-19 23:18:57] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:57] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:57] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:57] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:57] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:57] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:57] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sleep\u0000infinity\u0000", error: ""} [2025-06-19 23:18:57] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:57] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:57] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:57] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:57] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:57] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:57] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t956360\nNgid:\t0\nPid:\t956360\nPPid:\t956310\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t956360\nNSpid:\t956360\nNSpgid:\t956360\nNSsid:\t956360\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 892 kB\nVmRSS:\t 892 kB\nRssAnon:\t 88 kB\nRssFile:\t 804 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t43\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-06-19 23:18:57] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:57] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:23Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-xn4lg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:57] INFO -- CNTI: node_pid_by_container_id container_id: containerd://cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8 [2025-06-19 23:18:57] INFO -- CNTI: parse_container_id container_id: containerd://cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8 [2025-06-19 23:18:57] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:57] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:57] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:58] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:58] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:58] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:58] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:58Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:58Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:58] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-rm4bt,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-controller-manager-84cc698fbc-rm4bt\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.136.94:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.136.94\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.136.94\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.136.94:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-84cc698fbc-rm4bt\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"18591411-e984-41dc-ad57-3607209e65d7\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~projected/kube-api-access-xn4lg\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/containers/manager/6f49aa31\"\n }\n ]\n },\n \"pid\": 957671,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-controller-manager-84cc698fbc-rm4bt\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"18591411-e984-41dc-ad57-3607209e65d7\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-pod18591411_e984_41dc_ad57_3607209e65d7.slice:cri-containerd:cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/957460/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/957460/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/957460/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/containers/manager/6f49aa31\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~projected/kube-api-access-xn4lg\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-controller-manager-84cc698fbc-rm4bt\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"CONTAINER_NAME=manager\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-rm4bt,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"POD_NAME=gatekeeper-controller-manager-84cc698fbc-rm4bt\",\n \"NAMESPACE=cnf-testsuite\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1\",\n \"snapshotKey\": \"cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-06-19T23:18:23.23893255Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-84cc698fbc-rm4bt\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"18591411-e984-41dc-ad57-3607209e65d7\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-84cc698fbc-rm4bt_18591411-e984-41dc-ad57-3607209e65d7/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~projected/kube-api-access-xn4lg\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/containers/manager/6f49aa31\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:18:23.456679686Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:58Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:58Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:58] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "command": [ "/manager" ], "envs": [ { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-rm4bt,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "POD_NAME", "value": "gatekeeper-controller-manager-84cc698fbc-rm4bt" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.136.94:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.136.94" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.136.94" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.136.94:443" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-84cc698fbc-rm4bt", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "18591411-e984-41dc-ad57-3607209e65d7" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~projected/kube-api-access-xn4lg", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/containers/manager/6f49aa31" } ] }, "pid": 957671, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1", "io.kubernetes.cri.sandbox-name": "gatekeeper-controller-manager-84cc698fbc-rm4bt", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "18591411-e984-41dc-ad57-3607209e65d7" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-pod18591411_e984_41dc_ad57_3607209e65d7.slice:cri-containerd:cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/957460/ns/ipc", "type": "ipc" }, { "path": "/proc/957460/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/957460/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/containers/manager/6f49aa31", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~projected/kube-api-access-xn4lg", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-controller-manager-84cc698fbc-rm4bt", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "CONTAINER_NAME=manager", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-rm4bt,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "POD_NAMESPACE=cnf-testsuite", "POD_NAME=gatekeeper-controller-manager-84cc698fbc-rm4bt", "NAMESPACE=cnf-testsuite", "KUBERNETES_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94", "KUBERNETES_PORT=tcp://10.96.0.1:443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94", "KUBERNETES_SERVICE_PORT_HTTPS=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "750bf3e84e378c2d095cf92fe261d2ddd4394825a80d87d71366b74f5007d1d1", "snapshotKey": "cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-06-19T23:18:23.23893255Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-84cc698fbc-rm4bt", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "18591411-e984-41dc-ad57-3607209e65d7" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-84cc698fbc-rm4bt_18591411-e984-41dc-ad57-3607209e65d7/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/volumes/kubernetes.io~projected/kube-api-access-xn4lg", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18591411-e984-41dc-ad57-3607209e65d7/containers/manager/6f49aa31", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-06-19T23:18:23.456679686Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-06-19 23:18:58] INFO -- CNTI: node_pid_by_container_id pid: 957671 [2025-06-19 23:18:58] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:58] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:58] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:58] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:58] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:58] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000", error: ""} [2025-06-19 23:18:58] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:58] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:58] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:58] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:58] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:59] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t957671\nNgid:\t0\nPid:\t957671\nPPid:\t957400\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t957671\t1\nNSpid:\t957671\t1\nNSpgid:\t957671\t1\nNSsid:\t957671\t1\nVmPeak:\t 1309968 kB\nVmSize:\t 1309968 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 84848 kB\nVmRSS:\t 84848 kB\nRssAnon:\t 32624 kB\nRssFile:\t 52224 kB\nRssShmem:\t 0 kB\nVmData:\t 89236 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 324 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t42\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t222\nnonvoluntary_ctxt_switches:\t10\n", error: ""} [2025-06-19 23:18:59] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:18:59] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:23:58Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v131-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v131-worker2"}, "name" => "v131-worker2", "resourceVersion" => "1485569", "uid" => "dab733c4-e0bc-424f-ab96-003a9e0bbb2a"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v131/v131-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.7", "type" => "InternalIP"}, {"address" => "v131-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:24:14Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["docker.io/library/docker@sha256:eec0f0f3bb32ce2ddb6b577d7c7e1811dfb0c55fb9367c899a8e0a99daf3a48f", "docker.io/library/docker:dind"], "sizeBytes" => 143701746}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.31.9", "registry.k8s.io/kube-apiserver:v1.31.9"], "sizeBytes" => 95177201}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.31.9", "registry.k8s.io/kube-proxy:v1.31.9"], "sizeBytes" => 93163721}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.31.9", "registry.k8s.io/kube-controller-manager:v1.31.9"], "sizeBytes" => 89782615}, {"names" => ["docker.io/library/nginx@sha256:6784fb0834aa7dbbe12e3d7471e69c290df3e6ba810dc38b34ae33d3c1c05f7d", "docker.io/library/nginx:latest"], "sizeBytes" => 72406859}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.31.9", "registry.k8s.io/kube-scheduler:v1.31.9"], "sizeBytes" => 68925783}, {"names" => ["registry.k8s.io/etcd:3.5.15-0"], "sizeBytes" => 56909194}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:b173c7d0ffe3d805d49f4dfe48375169b7b8d2e1feb81783efd61eb9d08042e6", "registry.k8s.io/e2e-test-images/agnhost:2.52"], "sizeBytes" => 52184518}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:405a14e1aa702f7ea133cea459e8395fe40a6125c088c55569e696d48e1bd385", "registry.k8s.io/sig-storage/csi-provisioner:v5.0.1"], "sizeBytes" => 30334083}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:a541e6cc2d8b011bb21b1d4ffec6b090e85270cce6276ee302d86153eec0af43", "registry.k8s.io/sig-storage/csi-resizer:v1.11.1"], "sizeBytes" => 29161532}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:b4d611100ece2f9bc980d1cb19c2285b8868da261e3b1ee8f45448ab5512ab94", "registry.k8s.io/sig-storage/csi-attacher:v4.6.1"], "sizeBytes" => 28974442}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:ef95281310c7a23891b01f1e1c700330422c46636805a60eff76b5593031e141", "registry.k8s.io/sig-storage/hostpathplugin:v1.14.0"], "sizeBytes" => 21621791}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/aquasec/kube-bench@sha256:23d4ae0566b98dfee53d4b7a9ef824b6ed1c6b3a8f52bab927e5521f871b5104", "docker.io/aquasec/kube-bench:v0.6.10"], "sizeBytes" => 18243491}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:b64f9c8ec79c5dae244ae6608c433bf16c9d4f84248dcba4a6beb2e97b9426d7", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.1"], "sizeBytes" => 17992142}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:f25af73ee708ff9c82595ae99493cdef9295bd96953366cddf36305f82555dac", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1"], "sizeBytes" => 10984895}, {"names" => ["docker.io/curlimages/curl@sha256:3dfa70a646c5d03ddf0e7c0ff518a5661e95b8bcbc82079f0fb7453a96eaae35", "docker.io/curlimages/curl:8.12.0"], "sizeBytes" => 10048754}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}, {"names" => ["gcr.io/authenticated-image-pulling/alpine@sha256:7ff177862cb50c602bfe81f805969412e619c054a2bbead977d0c276988aa4a0", "gcr.io/authenticated-image-pulling/alpine:3.7"], "sizeBytes" => 2110879}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:c318242786b139d18676b1c09a0ad7f15fc17f8f16a5b2e625cd0dc8c9703daf", "registry.k8s.io/e2e-test-images/busybox:1.29-2"], "sizeBytes" => 732424}, {"names" => ["docker.io/library/busybox@sha256:141c253bc4c3fd0a201d32dc1f493bcf3fff003b6df416dea4f41046e0f37d47", "docker.io/library/busybox:1.28"], "sizeBytes" => 727869}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.31.9", "kubeletVersion" => "v1.31.9", "machineID" => "1c265279c932434fbff96a7c61e69335", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "39f56d74-4b03-4e0f-8892-b6a4a2197a64"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-06-19T23:18:17Z", "generateName" => "gatekeeper-controller-manager-84cc698fbc-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "84cc698fbc", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-controller-manager-84cc698fbc-rm4bt", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-controller-manager-84cc698fbc", "uid" => "35d2df79-9eb3-48d2-9b78-f97ac7a789d7"}], "resourceVersion" => "1485505", "uid" => "18591411-e984-41dc-ad57-3607209e65d7"}, "spec" => {"affinity" => {"podAntiAffinity" => {"preferredDuringSchedulingIgnoredDuringExecution" => [{"podAffinityTerm" => {"labelSelector" => {"matchExpressions" => [{"key" => "gatekeeper.sh/operation", "operator" => "In", "values" => ["webhook"]}]}, "topologyKey" => "kubernetes.io/hostname"}, "weight" => 100}]}}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8443, "name" => "webhook-server", "protocol" => "TCP"}, {"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-xn4lg", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v131-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"name" => "kube-api-access-xn4lg", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:24Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:24Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:23Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-xn4lg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.7", "hostIPs" => [{"ip" => "172.24.0.7"}], "phase" => "Running", "podIP" => "10.244.2.242", "podIPs" => [{"ip" => "10.244.2.242"}], "qosClass" => "Burstable", "startTime" => "2025-06-19T23:18:17Z"}}, container_status: {"containerID" => "containerd://cd29925f90a71648d2ccaf552a2d87b319d66cd718098922ab489f92511f27a8", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:23Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-xn4lg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t957671\nNgid:\t0\nPid:\t957671\nPPid:\t957400\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t957671\t1\nNSpid:\t957671\t1\nNSpgid:\t957671\t1\nNSsid:\t957671\t1\nVmPeak:\t 1309968 kB\nVmSize:\t 1309968 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 84848 kB\nVmRSS:\t 84848 kB\nRssAnon:\t 32624 kB\nRssFile:\t 52224 kB\nRssShmem:\t 0 kB\nVmData:\t 89236 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 324 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t42\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t222\nnonvoluntary_ctxt_switches:\t10\n", pid: "957671", cmdline: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000"} [2025-06-19 23:18:59] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:22Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l7c7b", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:18:59] INFO -- CNTI: node_pid_by_container_id container_id: containerd://29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56 [2025-06-19 23:18:59] INFO -- CNTI: parse_container_id container_id: containerd://29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56 [2025-06-19 23:18:59] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:59] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:59] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:59] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:59] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:59] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:18:59Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:18:59Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:18:59] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-controller-manager-84cc698fbc-scj7x\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-scj7x,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.136.94\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.136.94:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.136.94:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.136.94\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-84cc698fbc-scj7x\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"c40f14f9-cf0c-44ee-a3fa-e3cb95367abd\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~projected/kube-api-access-l7c7b\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/containers/manager/393edf1a\"\n }\n ]\n },\n \"pid\": 957611,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-controller-manager-84cc698fbc-scj7x\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"c40f14f9-cf0c-44ee-a3fa-e3cb95367abd\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-podc40f14f9_cf0c_44ee_a3fa_e3cb95367abd.slice:cri-containerd:29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/957461/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/957461/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/957461/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/containers/manager/393edf1a\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~projected/kube-api-access-l7c7b\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-controller-manager-84cc698fbc-scj7x\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"POD_NAME=gatekeeper-controller-manager-84cc698fbc-scj7x\",\n \"NAMESPACE=cnf-testsuite\",\n \"CONTAINER_NAME=manager\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-scj7x,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94\",\n \"KUBERNETES_SERVICE_PORT=443\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68\",\n \"snapshotKey\": \"29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-06-19T23:18:22.482137173Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-84cc698fbc-scj7x\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"c40f14f9-cf0c-44ee-a3fa-e3cb95367abd\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-84cc698fbc-scj7x_c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~projected/kube-api-access-l7c7b\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/containers/manager/393edf1a\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:18:22.729185438Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:18:59Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:18:59Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:18:59] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "command": [ "/manager" ], "envs": [ { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "POD_NAME", "value": "gatekeeper-controller-manager-84cc698fbc-scj7x" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-scj7x,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.136.94" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.136.94:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.136.94:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.136.94" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-84cc698fbc-scj7x", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "c40f14f9-cf0c-44ee-a3fa-e3cb95367abd" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~projected/kube-api-access-l7c7b", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/containers/manager/393edf1a" } ] }, "pid": 957611, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68", "io.kubernetes.cri.sandbox-name": "gatekeeper-controller-manager-84cc698fbc-scj7x", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "c40f14f9-cf0c-44ee-a3fa-e3cb95367abd" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-podc40f14f9_cf0c_44ee_a3fa_e3cb95367abd.slice:cri-containerd:29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/957461/ns/ipc", "type": "ipc" }, { "path": "/proc/957461/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/957461/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/containers/manager/393edf1a", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~projected/kube-api-access-l7c7b", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-controller-manager-84cc698fbc-scj7x", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "POD_NAMESPACE=cnf-testsuite", "POD_NAME=gatekeeper-controller-manager-84cc698fbc-scj7x", "NAMESPACE=cnf-testsuite", "CONTAINER_NAME=manager", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-84cc698fbc-scj7x,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.136.94", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.136.94:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.136.94:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.136.94", "KUBERNETES_SERVICE_PORT=443" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "8d4db59fe3da46fbd95450271509b3ff20c0e34b63b5718cecaf64ebcf800b68", "snapshotKey": "29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-06-19T23:18:22.482137173Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-84cc698fbc-scj7x", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "c40f14f9-cf0c-44ee-a3fa-e3cb95367abd" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-84cc698fbc-scj7x_c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/volumes/kubernetes.io~projected/kube-api-access-l7c7b", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c40f14f9-cf0c-44ee-a3fa-e3cb95367abd/containers/manager/393edf1a", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-06-19T23:18:22.729185438Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-06-19 23:18:59] INFO -- CNTI: node_pid_by_container_id pid: 957611 [2025-06-19 23:18:59] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:59] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:18:59] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:18:59] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:18:59] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:18:59] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000", error: ""} [2025-06-19 23:18:59] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:18:59] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:18:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:00] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:00] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:00] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:00] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t957611\nNgid:\t0\nPid:\t957611\nPPid:\t957425\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t957611\t1\nNSpid:\t957611\t1\nNSpgid:\t957611\t1\nNSsid:\t957611\t1\nVmPeak:\t 1309456 kB\nVmSize:\t 1309456 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 87304 kB\nVmRSS:\t 87304 kB\nRssAnon:\t 34564 kB\nRssFile:\t 52740 kB\nRssShmem:\t 0 kB\nVmData:\t 88724 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 328 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t44\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t217\nnonvoluntary_ctxt_switches:\t13\n", error: ""} [2025-06-19 23:19:00] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:19:00] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:23:58Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v131-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v131-worker2"}, "name" => "v131-worker2", "resourceVersion" => "1485569", "uid" => "dab733c4-e0bc-424f-ab96-003a9e0bbb2a"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v131/v131-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.7", "type" => "InternalIP"}, {"address" => "v131-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:23:58Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-06-19T23:18:40Z", "lastTransitionTime" => "2025-06-10T13:24:14Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["docker.io/library/docker@sha256:eec0f0f3bb32ce2ddb6b577d7c7e1811dfb0c55fb9367c899a8e0a99daf3a48f", "docker.io/library/docker:dind"], "sizeBytes" => 143701746}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.31.9", "registry.k8s.io/kube-apiserver:v1.31.9"], "sizeBytes" => 95177201}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.31.9", "registry.k8s.io/kube-proxy:v1.31.9"], "sizeBytes" => 93163721}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.31.9", "registry.k8s.io/kube-controller-manager:v1.31.9"], "sizeBytes" => 89782615}, {"names" => ["docker.io/library/nginx@sha256:6784fb0834aa7dbbe12e3d7471e69c290df3e6ba810dc38b34ae33d3c1c05f7d", "docker.io/library/nginx:latest"], "sizeBytes" => 72406859}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.31.9", "registry.k8s.io/kube-scheduler:v1.31.9"], "sizeBytes" => 68925783}, {"names" => ["registry.k8s.io/etcd:3.5.15-0"], "sizeBytes" => 56909194}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:b173c7d0ffe3d805d49f4dfe48375169b7b8d2e1feb81783efd61eb9d08042e6", "registry.k8s.io/e2e-test-images/agnhost:2.52"], "sizeBytes" => 52184518}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:405a14e1aa702f7ea133cea459e8395fe40a6125c088c55569e696d48e1bd385", "registry.k8s.io/sig-storage/csi-provisioner:v5.0.1"], "sizeBytes" => 30334083}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:a541e6cc2d8b011bb21b1d4ffec6b090e85270cce6276ee302d86153eec0af43", "registry.k8s.io/sig-storage/csi-resizer:v1.11.1"], "sizeBytes" => 29161532}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:b4d611100ece2f9bc980d1cb19c2285b8868da261e3b1ee8f45448ab5512ab94", "registry.k8s.io/sig-storage/csi-attacher:v4.6.1"], "sizeBytes" => 28974442}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:ef95281310c7a23891b01f1e1c700330422c46636805a60eff76b5593031e141", "registry.k8s.io/sig-storage/hostpathplugin:v1.14.0"], "sizeBytes" => 21621791}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/aquasec/kube-bench@sha256:23d4ae0566b98dfee53d4b7a9ef824b6ed1c6b3a8f52bab927e5521f871b5104", "docker.io/aquasec/kube-bench:v0.6.10"], "sizeBytes" => 18243491}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:b64f9c8ec79c5dae244ae6608c433bf16c9d4f84248dcba4a6beb2e97b9426d7", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.1"], "sizeBytes" => 17992142}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:f25af73ee708ff9c82595ae99493cdef9295bd96953366cddf36305f82555dac", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.1"], "sizeBytes" => 10984895}, {"names" => ["docker.io/curlimages/curl@sha256:3dfa70a646c5d03ddf0e7c0ff518a5661e95b8bcbc82079f0fb7453a96eaae35", "docker.io/curlimages/curl:8.12.0"], "sizeBytes" => 10048754}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}, {"names" => ["gcr.io/authenticated-image-pulling/alpine@sha256:7ff177862cb50c602bfe81f805969412e619c054a2bbead977d0c276988aa4a0", "gcr.io/authenticated-image-pulling/alpine:3.7"], "sizeBytes" => 2110879}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:c318242786b139d18676b1c09a0ad7f15fc17f8f16a5b2e625cd0dc8c9703daf", "registry.k8s.io/e2e-test-images/busybox:1.29-2"], "sizeBytes" => 732424}, {"names" => ["docker.io/library/busybox@sha256:141c253bc4c3fd0a201d32dc1f493bcf3fff003b6df416dea4f41046e0f37d47", "docker.io/library/busybox:1.28"], "sizeBytes" => 727869}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.31.9", "kubeletVersion" => "v1.31.9", "machineID" => "1c265279c932434fbff96a7c61e69335", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "39f56d74-4b03-4e0f-8892-b6a4a2197a64"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-06-19T23:18:17Z", "generateName" => "gatekeeper-controller-manager-84cc698fbc-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "84cc698fbc", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-controller-manager-84cc698fbc-scj7x", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-controller-manager-84cc698fbc", "uid" => "35d2df79-9eb3-48d2-9b78-f97ac7a789d7"}], "resourceVersion" => "1485496", "uid" => "c40f14f9-cf0c-44ee-a3fa-e3cb95367abd"}, "spec" => {"affinity" => {"podAntiAffinity" => {"preferredDuringSchedulingIgnoredDuringExecution" => [{"podAffinityTerm" => {"labelSelector" => {"matchExpressions" => [{"key" => "gatekeeper.sh/operation", "operator" => "In", "values" => ["webhook"]}]}, "topologyKey" => "kubernetes.io/hostname"}, "weight" => 100}]}}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8443, "name" => "webhook-server", "protocol" => "TCP"}, {"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l7c7b", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v131-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"name" => "kube-api-access-l7c7b", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:23Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:18:17Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:22Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l7c7b", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.7", "hostIPs" => [{"ip" => "172.24.0.7"}], "phase" => "Running", "podIP" => "10.244.2.243", "podIPs" => [{"ip" => "10.244.2.243"}], "qosClass" => "Burstable", "startTime" => "2025-06-19T23:18:17Z"}}, container_status: {"containerID" => "containerd://29630169952cdafc3e598cf2c7b2f06c8239bedc03ce1306b6fceb56129c6f56", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:18:22Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l7c7b", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t957611\nNgid:\t0\nPid:\t957611\nPPid:\t957425\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t957611\t1\nNSpid:\t957611\t1\nNSpgid:\t957611\t1\nNSsid:\t957611\t1\nVmPeak:\t 1309456 kB\nVmSize:\t 1309456 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 87304 kB\nVmRSS:\t 87304 kB\nRssAnon:\t 34564 kB\nRssFile:\t 52740 kB\nRssShmem:\t 0 kB\nVmData:\t 88724 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 328 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t44\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t217\nnonvoluntary_ctxt_switches:\t13\n", pid: "957611", cmdline: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000"} [2025-06-19 23:19:00] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:18Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8kkx7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:19:00] INFO -- CNTI: node_pid_by_container_id container_id: containerd://ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8 [2025-06-19 23:19:00] INFO -- CNTI: parse_container_id container_id: containerd://ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8 [2025-06-19 23:19:00] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:00] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:00] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:00] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:00] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:00] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:19:00Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:19:00Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:19:00] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440\",\n \"user_specified_image\": \"alpine:3.6\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-p2hcc\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"300b6a06-1003-4238-a281-72a70413b29b\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"loopdev/0.log\",\n \"metadata\": {\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/dev\",\n \"host_path\": \"/dev\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/volumes/kubernetes.io~projected/kube-api-access-8kkx7\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/containers/loopdev/b0ae2274\"\n }\n ]\n },\n \"pid\": 862,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"loopdev\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"alpine:3.6\",\n \"io.kubernetes.cri.sandbox-id\": \"5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c\",\n \"io.kubernetes.cri.sandbox-name\": \"create-loop-devs-p2hcc\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"300b6a06-1003-4238-a281-72a70413b29b\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod300b6a06_1003_4238_a281_72a70413b29b.slice:cri-containerd:ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/829/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/829/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/829/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/dev\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/containers/loopdev/b0ae2274\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/volumes/kubernetes.io~projected/kube-api-access-8kkx7\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=create-loop-devs-p2hcc\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0,\n 1,\n 2,\n 3,\n 4,\n 6,\n 10,\n 11,\n 20,\n 26,\n 27\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c\",\n \"snapshotKey\": \"ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:18.554350239Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/library/alpine:3.6\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-p2hcc\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"300b6a06-1003-4238-a281-72a70413b29b\"\n },\n \"logPath\": \"/var/log/pods/kube-system_create-loop-devs-p2hcc_300b6a06-1003-4238-a281-72a70413b29b/loopdev/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/dev\",\n \"gidMappings\": [],\n \"hostPath\": \"/dev\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/volumes/kubernetes.io~projected/kube-api-access-8kkx7\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/containers/loopdev/b0ae2274\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:18.693746062Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\",\n \"1\",\n \"2\",\n \"3\",\n \"4\",\n \"6\",\n \"10\",\n \"11\",\n \"20\",\n \"26\",\n \"27\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:19:00Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:19:00Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:19:00] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "envs": [ { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" } ], "image": { "image": "sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440", "user_specified_image": "alpine:3.6" }, "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-p2hcc", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "300b6a06-1003-4238-a281-72a70413b29b" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "loopdev/0.log", "metadata": { "name": "loopdev" }, "mounts": [ { "container_path": "/dev", "host_path": "/dev" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/volumes/kubernetes.io~projected/kube-api-access-8kkx7", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/containers/loopdev/b0ae2274" } ] }, "pid": 862, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "loopdev", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "alpine:3.6", "io.kubernetes.cri.sandbox-id": "5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c", "io.kubernetes.cri.sandbox-name": "create-loop-devs-p2hcc", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "300b6a06-1003-4238-a281-72a70413b29b" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod300b6a06_1003_4238_a281_72a70413b29b.slice:cri-containerd:ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/829/ns/ipc", "type": "ipc" }, { "path": "/proc/829/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/829/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/dev", "options": [ "rbind", "rprivate", "rw" ], "source": "/dev", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/containers/loopdev/b0ae2274", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/volumes/kubernetes.io~projected/kube-api-access-8kkx7", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=create-loop-devs-p2hcc", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0, 1, 2, 3, 4, 6, 10, 11, 20, 26, 27 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "5b68d5d76280230bc34a6f041479d8a08ddababa04f4ce1757850553c0fb324c", "snapshotKey": "ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:18.554350239Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "ab00dbc4f581279c0f859525438735110c1f196e44246bcada907a99209724b8", "image": { "annotations": {}, "image": "docker.io/library/alpine:3.6", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-p2hcc", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "300b6a06-1003-4238-a281-72a70413b29b" }, "logPath": "/var/log/pods/kube-system_create-loop-devs-p2hcc_300b6a06-1003-4238-a281-72a70413b29b/loopdev/0.log", "message": "", "metadata": { "attempt": 0, "name": "loopdev" }, "mounts": [ { "containerPath": "/dev", "gidMappings": [], "hostPath": "/dev", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/volumes/kubernetes.io~projected/kube-api-access-8kkx7", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/300b6a06-1003-4238-a281-72a70413b29b/containers/loopdev/b0ae2274", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-06-10T13:24:18.693746062Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0", "1", "2", "3", "4", "6", "10", "11", "20", "26", "27" ], "uid": "0" } } } } [2025-06-19 23:19:00] INFO -- CNTI: node_pid_by_container_id pid: 862 [2025-06-19 23:19:00] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:00] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:00] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:00] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:00] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:01] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sh\u0000-c\u0000while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n\u0000", error: ""} [2025-06-19 23:19:01] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:01] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:01] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:01] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:01] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:01] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t862\nNgid:\t0\nPid:\t862\nPPid:\t805\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t862\t1\nNSpid:\t862\t1\nNSpgid:\t862\t1\nNSsid:\t862\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 268 kB\nRssAnon:\t 80 kB\nRssFile:\t 188 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t917\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-06-19 23:19:01] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:19:01] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302", "image" => "docker.io/kindest/kindnetd:v20250512-df8de77b", "imageID" => "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:03Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/nri", "name" => "nri-plugin"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-txwwg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:19:01] INFO -- CNTI: node_pid_by_container_id container_id: containerd://b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302 [2025-06-19 23:19:01] INFO -- CNTI: parse_container_id container_id: containerd://b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302 [2025-06-19 23:19:01] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:01] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:01] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:01] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:01] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:01] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:19:01Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:19:01Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:19:01] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"envs\": [\n {\n \"key\": \"HOST_IP\",\n \"value\": \"172.24.0.7\"\n },\n {\n \"key\": \"POD_IP\",\n \"value\": \"172.24.0.7\"\n },\n {\n \"key\": \"POD_SUBNET\",\n \"value\": \"10.244.0.0/16\"\n },\n {\n \"key\": \"CONTROL_PLANE_ENDPOINT\",\n \"value\": \"v131-control-plane:6443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"user_specified_image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-f9g2x\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"1cce1f8e-6728-426d-bfb2-6c7f097c8e7b\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 52428800,\n \"memory_swap_limit_in_bytes\": 52428800,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"capabilities\": {\n \"add_capabilities\": [\n \"NET_RAW\",\n \"NET_ADMIN\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kindnet-cni/0.log\",\n \"metadata\": {\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/cni/net.d\",\n \"host_path\": \"/etc/cni/net.d\"\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/nri\",\n \"host_path\": \"/var/run/nri\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/volumes/kubernetes.io~projected/kube-api-access-txwwg\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/containers/kindnet-cni/e6b8e8ef\"\n }\n ]\n },\n \"pid\": 693,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kindnet-cni\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"io.kubernetes.cri.sandbox-id\": \"5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285\",\n \"io.kubernetes.cri.sandbox-name\": \"kindnet-f9g2x\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"1cce1f8e-6728-426d-bfb2-6c7f097c8e7b\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pod1cce1f8e_6728_426d_bfb2_6c7f097c8e7b.slice:cri-containerd:b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/452/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/452/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/452/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 52428800,\n \"swap\": 52428800\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/containers/kindnet-cni/e6b8e8ef\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/cni/net.d\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/etc/cni/net.d\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/nri\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/run/nri\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/volumes/kubernetes.io~projected/kube-api-access-txwwg\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/kindnetd\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v131-worker2\",\n \"HOST_IP=172.24.0.7\",\n \"POD_IP=172.24.0.7\",\n \"POD_SUBNET=10.244.0.0/16\",\n \"CONTROL_PLANE_ENDPOINT=v131-control-plane:6443\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285\",\n \"snapshotKey\": \"b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:01.67792286Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-f9g2x\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"1cce1f8e-6728-426d-bfb2-6c7f097c8e7b\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kindnet-f9g2x_1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/kindnet-cni/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/cni/net.d\",\n \"gidMappings\": [],\n \"hostPath\": \"/etc/cni/net.d\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/nri\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/run/nri\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/volumes/kubernetes.io~projected/kube-api-access-txwwg\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/containers/kindnet-cni/e6b8e8ef\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"52428800\",\n \"memorySwapLimitInBytes\": \"52428800\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:03.49464977Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:19:01Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:19:01Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:19:01] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "envs": [ { "key": "HOST_IP", "value": "172.24.0.7" }, { "key": "POD_IP", "value": "172.24.0.7" }, { "key": "POD_SUBNET", "value": "10.244.0.0/16" }, { "key": "CONTROL_PLANE_ENDPOINT", "value": "v131-control-plane:6443" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" } ], "image": { "image": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "user_specified_image": "docker.io/kindest/kindnetd:v20250512-df8de77b" }, "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-f9g2x", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "1cce1f8e-6728-426d-bfb2-6c7f097c8e7b" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 52428800, "memory_swap_limit_in_bytes": 52428800, "oom_score_adj": -997 }, "security_context": { "capabilities": { "add_capabilities": [ "NET_RAW", "NET_ADMIN" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kindnet-cni/0.log", "metadata": { "name": "kindnet-cni" }, "mounts": [ { "container_path": "/etc/cni/net.d", "host_path": "/etc/cni/net.d" }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/nri", "host_path": "/var/run/nri" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/volumes/kubernetes.io~projected/kube-api-access-txwwg", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/containers/kindnet-cni/e6b8e8ef" } ] }, "pid": 693, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kindnet-cni", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/kindest/kindnetd:v20250512-df8de77b", "io.kubernetes.cri.sandbox-id": "5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285", "io.kubernetes.cri.sandbox-name": "kindnet-f9g2x", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "1cce1f8e-6728-426d-bfb2-6c7f097c8e7b" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pod1cce1f8e_6728_426d_bfb2_6c7f097c8e7b.slice:cri-containerd:b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/452/ns/ipc", "type": "ipc" }, { "path": "/proc/452/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/452/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 52428800, "swap": 52428800 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/containers/kindnet-cni/e6b8e8ef", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285/shm", "type": "bind" }, { "destination": "/etc/cni/net.d", "options": [ "rbind", "rprivate", "rw" ], "source": "/etc/cni/net.d", "type": "bind" }, { "destination": "/var/run/nri", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/run/nri", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/volumes/kubernetes.io~projected/kube-api-access-txwwg", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/kindnetd" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v131-worker2", "HOST_IP=172.24.0.7", "POD_IP=172.24.0.7", "POD_SUBNET=10.244.0.0/16", "CONTROL_PLANE_ENDPOINT=v131-control-plane:6443", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "5295de4d536aabf9f806a72f1cee54e7b391cb1be656d50b526263ac17309285", "snapshotKey": "b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:01.67792286Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "b74f15dd0eed026f383a8313f54d1c4dcb4d68ba39e54515a6d9525c1dcc6302", "image": { "annotations": {}, "image": "docker.io/kindest/kindnetd:v20250512-df8de77b", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-f9g2x", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "1cce1f8e-6728-426d-bfb2-6c7f097c8e7b" }, "logPath": "/var/log/pods/kube-system_kindnet-f9g2x_1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/kindnet-cni/0.log", "message": "", "metadata": { "attempt": 0, "name": "kindnet-cni" }, "mounts": [ { "containerPath": "/etc/cni/net.d", "gidMappings": [], "hostPath": "/etc/cni/net.d", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/nri", "gidMappings": [], "hostPath": "/var/run/nri", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/volumes/kubernetes.io~projected/kube-api-access-txwwg", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1cce1f8e-6728-426d-bfb2-6c7f097c8e7b/containers/kindnet-cni/e6b8e8ef", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "52428800", "memorySwapLimitInBytes": "52428800", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:03.49464977Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:19:01] INFO -- CNTI: node_pid_by_container_id pid: 693 [2025-06-19 23:19:01] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:01] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:02] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:02] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:02] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:02] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/bin/kindnetd\u0000", error: ""} [2025-06-19 23:19:02] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:02] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:02] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:02] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:02] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:02] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t693\nNgid:\t560463\nPid:\t693\nPPid:\t395\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t693\t1\nNSpid:\t693\t1\nNSpgid:\t693\t1\nNSsid:\t693\t1\nVmPeak:\t 1285960 kB\nVmSize:\t 1285960 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 51092 kB\nVmRSS:\t 23320 kB\nRssAnon:\t 13776 kB\nRssFile:\t 9544 kB\nRssShmem:\t 0 kB\nVmData:\t 64400 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 252 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t37\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t87201\nnonvoluntary_ctxt_switches:\t2997\n", error: ""} [2025-06-19 23:19:02] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:19:02] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73", "image" => "registry.k8s.io/kube-proxy-amd64:v1.31.9", "imageID" => "sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:00Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-kcvdk", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:19:02] INFO -- CNTI: node_pid_by_container_id container_id: containerd://730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73 [2025-06-19 23:19:02] INFO -- CNTI: parse_container_id container_id: containerd://730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73 [2025-06-19 23:19:02] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:02] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:02] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:02] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:02] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:03] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:19:03Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:19:03Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:19:03] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"94ebe9f0\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v131-worker2\"\n ],\n \"envs\": [\n {\n \"key\": \"NODE_NAME\",\n \"value\": \"v131-worker2\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\",\n \"user_specified_image\": \"registry.k8s.io/kube-proxy:v1.31.9\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-cplll\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"1482c471-60d0-43a8-acea-fadbdfcc27dc\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kube-proxy/0.log\",\n \"metadata\": {\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/var/lib/kube-proxy\",\n \"host_path\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~configmap/kube-proxy\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~projected/kube-api-access-kcvdk\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/containers/kube-proxy/b269942e\"\n }\n ]\n },\n \"pid\": 502,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kube-proxy\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"registry.k8s.io/kube-proxy:v1.31.9\",\n \"io.kubernetes.cri.sandbox-id\": \"f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a\",\n \"io.kubernetes.cri.sandbox-name\": \"kube-proxy-cplll\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"1482c471-60d0-43a8-acea-fadbdfcc27dc\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod1482c471_60d0_43a8_acea_fadbdfcc27dc.slice:cri-containerd:730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/445/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/445/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/445/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/containers/kube-proxy/b269942e\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/lib/kube-proxy\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~configmap/kube-proxy\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~projected/kube-api-access-kcvdk\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v131-worker2\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v131-worker2\",\n \"NODE_NAME=v131-worker2\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a\",\n \"snapshotKey\": \"730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"94ebe9f0\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:00.408593727Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"registry.k8s.io/kube-proxy-amd64:v1.31.9\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-cplll\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"1482c471-60d0-43a8-acea-fadbdfcc27dc\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kube-proxy-cplll_1482c471-60d0-43a8-acea-fadbdfcc27dc/kube-proxy/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/var/lib/kube-proxy\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~configmap/kube-proxy\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~projected/kube-api-access-kcvdk\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/containers/kube-proxy/b269942e\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:00.685114391Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:19:03Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:19:03Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:19:03] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "94ebe9f0", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v131-worker2" ], "envs": [ { "key": "NODE_NAME", "value": "v131-worker2" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "image": { "image": "sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578", "user_specified_image": "registry.k8s.io/kube-proxy:v1.31.9" }, "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-cplll", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "1482c471-60d0-43a8-acea-fadbdfcc27dc" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kube-proxy/0.log", "metadata": { "name": "kube-proxy" }, "mounts": [ { "container_path": "/var/lib/kube-proxy", "host_path": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~configmap/kube-proxy", "readonly": true }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~projected/kube-api-access-kcvdk", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/containers/kube-proxy/b269942e" } ] }, "pid": 502, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kube-proxy", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "registry.k8s.io/kube-proxy:v1.31.9", "io.kubernetes.cri.sandbox-id": "f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a", "io.kubernetes.cri.sandbox-name": "kube-proxy-cplll", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "1482c471-60d0-43a8-acea-fadbdfcc27dc" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod1482c471_60d0_43a8_acea_fadbdfcc27dc.slice:cri-containerd:730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/445/ns/ipc", "type": "ipc" }, { "path": "/proc/445/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/445/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/containers/kube-proxy/b269942e", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a/shm", "type": "bind" }, { "destination": "/var/lib/kube-proxy", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~configmap/kube-proxy", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~projected/kube-api-access-kcvdk", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v131-worker2" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v131-worker2", "NODE_NAME=v131-worker2", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "f0045bf833588cd692b559567d0199ebc95da0e433e10f08ecd1874225d1d44a", "snapshotKey": "730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "94ebe9f0", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:00.408593727Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "730853cacf6201074da22f62b1aef662fb19fc3e0c8431f77c649b5c41cedb73", "image": { "annotations": {}, "image": "registry.k8s.io/kube-proxy-amd64:v1.31.9", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578", "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-cplll", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "1482c471-60d0-43a8-acea-fadbdfcc27dc" }, "logPath": "/var/log/pods/kube-system_kube-proxy-cplll_1482c471-60d0-43a8-acea-fadbdfcc27dc/kube-proxy/0.log", "message": "", "metadata": { "attempt": 0, "name": "kube-proxy" }, "mounts": [ { "containerPath": "/var/lib/kube-proxy", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~configmap/kube-proxy", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/volumes/kubernetes.io~projected/kube-api-access-kcvdk", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1482c471-60d0-43a8-acea-fadbdfcc27dc/containers/kube-proxy/b269942e", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:00.685114391Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:19:03] INFO -- CNTI: node_pid_by_container_id pid: 502 [2025-06-19 23:19:03] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:03] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:03] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:03] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:03] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:03] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:03] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/usr/local/bin/kube-proxy\u0000--config=/var/lib/kube-proxy/config.conf\u0000--hostname-override=v131-worker2\u0000", error: ""} [2025-06-19 23:19:03] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:03] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:03] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:03] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-crvg8 [2025-06-19 23:19:03] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-crvg8 [2025-06-19 23:19:03] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 [2025-06-19 23:19:03] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t502\nNgid:\t559540\nPid:\t502\nPPid:\t391\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t502\t1\nNSpid:\t502\t1\nNSpgid:\t502\t1\nNSsid:\t502\t1\nVmPeak:\t 1297708 kB\nVmSize:\t 1297708 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56692 kB\nVmRSS:\t 31184 kB\nRssAnon:\t 16588 kB\nRssFile:\t 14596 kB\nRssShmem:\t 0 kB\nVmData:\t 70800 kB\nVmStk:\t 132 kB\nVmExe:\t 29500 kB\nVmLib:\t 8 kB\nVmPTE:\t 268 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t33\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t18376\nnonvoluntary_ctxt_switches:\t73\n", error: ""} [2025-06-19 23:19:03] DEBUG -- CNTI-find_matching_processes: [2025-06-19 23:19:03] INFO -- CNTI-prometheus_traffic:process_search: Found 4 matching processes for prometheus [2025-06-19 23:19:03] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 992757 [2025-06-19 23:19:03] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-audit-76b669b584-q6z5b to service [2025-06-19 23:19:03] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:04] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-06-19 23:19:04] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-76b669b584-q6z5b, gatekeeper-controller-manager-84cc698fbc-4mbhm, gatekeeper-controller-manager-84cc698fbc-rm4bt, gatekeeper-controller-manager-84cc698fbc-scj7x [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-06-19 23:19:04] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-7c65d6cfc9-hlg4b, coredns-7c65d6cfc9-n85ww [2025-06-19 23:19:04] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-audit-76b669b584-q6z5b matched to service: gatekeeper-webhook-service [2025-06-19 23:19:04] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:06] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v131-worker, v131-worker2 [2025-06-19 23:19:06] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:06] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-n9lh4, cluster-tools-crvg8 [2025-06-19 23:19:06] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:19:06] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "1484183", "uid" => "369758cb-3ed3-471b-a011-4b5b93196e04"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-06-19T23:15:08Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "1484692", "uid" => "b15ac41a-b732-4dfc-9342-0b3a057a90e4"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:19:06] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:06] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-06-19 23:19:06] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-06-19 23:19:06] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-06-19 23:19:06] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 992815 [2025-06-19 23:19:06] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-controller-manager-84cc698fbc-4mbhm to service [2025-06-19 23:19:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:07] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-06-19 23:19:07] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-76b669b584-q6z5b, gatekeeper-controller-manager-84cc698fbc-4mbhm, gatekeeper-controller-manager-84cc698fbc-rm4bt, gatekeeper-controller-manager-84cc698fbc-scj7x [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-06-19 23:19:07] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-7c65d6cfc9-hlg4b, coredns-7c65d6cfc9-n85ww [2025-06-19 23:19:07] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-controller-manager-84cc698fbc-4mbhm matched to service: gatekeeper-webhook-service [2025-06-19 23:19:07] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:09] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v131-worker, v131-worker2 [2025-06-19 23:19:09] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:09] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-n9lh4, cluster-tools-crvg8 [2025-06-19 23:19:09] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:19:09] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "1484183", "uid" => "369758cb-3ed3-471b-a011-4b5b93196e04"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-06-19T23:15:08Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "1484692", "uid" => "b15ac41a-b732-4dfc-9342-0b3a057a90e4"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:19:09] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:09] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-06-19 23:19:09] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-06-19 23:19:09] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-06-19 23:19:09] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 957671 [2025-06-19 23:19:09] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-controller-manager-84cc698fbc-rm4bt to service [2025-06-19 23:19:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-06-19 23:19:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:10] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-06-19 23:19:10] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-76b669b584-q6z5b, gatekeeper-controller-manager-84cc698fbc-4mbhm, gatekeeper-controller-manager-84cc698fbc-rm4bt, gatekeeper-controller-manager-84cc698fbc-scj7x [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-06-19 23:19:10] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-7c65d6cfc9-hlg4b, coredns-7c65d6cfc9-n85ww [2025-06-19 23:19:10] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-controller-manager-84cc698fbc-rm4bt matched to service: gatekeeper-webhook-service [2025-06-19 23:19:10] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:11] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v131-worker, v131-worker2 [2025-06-19 23:19:11] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:12] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-n9lh4, cluster-tools-crvg8 [2025-06-19 23:19:12] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:19:12] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "1484183", "uid" => "369758cb-3ed3-471b-a011-4b5b93196e04"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-06-19T23:15:08Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "1484692", "uid" => "b15ac41a-b732-4dfc-9342-0b3a057a90e4"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:19:12] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:12] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-06-19 23:19:12] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-06-19 23:19:12] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-06-19 23:19:12] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 957611 [2025-06-19 23:19:12] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-controller-manager-84cc698fbc-scj7x to service [2025-06-19 23:19:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-06-19 23:19:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:13] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-06-19 23:19:13] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-76b669b584-q6z5b, gatekeeper-controller-manager-84cc698fbc-4mbhm, gatekeeper-controller-manager-84cc698fbc-rm4bt, gatekeeper-controller-manager-84cc698fbc-scj7x [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-06-19 23:19:13] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-7c65d6cfc9-hlg4b, coredns-7c65d6cfc9-n85ww [2025-06-19 23:19:13] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-controller-manager-84cc698fbc-scj7x matched to service: gatekeeper-webhook-service [2025-06-19 23:19:13] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:15] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v131-worker, v131-worker2 [2025-06-19 23:19:15] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:15] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:15] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:15] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-n9lh4, cluster-tools-crvg8 [2025-06-19 23:19:15] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:15] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:19:15] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "1484183", "uid" => "369758cb-3ed3-471b-a011-4b5b93196e04"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-06-19T23:15:08Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "1484692", "uid" => "b15ac41a-b732-4dfc-9342-0b3a057a90e4"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:19:15] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 ⏭️ ✨SKIPPED: [prometheus_traffic] Prometheus server not found 📶☠️ [2025-06-19 23:19:15] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-06-19 23:19:15] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-06-19 23:19:15] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'prometheus_traffic' emoji: 📶☠️ [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'prometheus_traffic' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points: Task: 'prometheus_traffic' type: bonus [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.Points.task_points: Task: prometheus_traffic is worth: 0 points [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'prometheus_traffic' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points: Task: 'prometheus_traffic' type: bonus [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.upsert_task-prometheus_traffic: Task start time: 2025-06-19 23:18:44 UTC, end time: 2025-06-19 23:19:15 UTC [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.Points.upsert_task-prometheus_traffic: Task: 'prometheus_traffic' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:30.904894727 [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:15] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:15] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:15] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:15] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:15] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [open_metrics] [2025-06-19 23:19:15] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.Task.task_runner.open_metrics: Starting test [2025-06-19 23:19:15] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmap/cnf-testsuite-open-metrics ⏭️ ✨SKIPPED: [open_metrics] Prometheus traffic not configured 📶☠️ [2025-06-19 23:19:15] WARN -- CNTI-KubectlClient.Get.resource.cmd: stderr: Error from server (NotFound): configmaps "cnf-testsuite-open-metrics" not found [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'open_metrics' emoji: 📶☠️ [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'open_metrics' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points: Task: 'open_metrics' type: bonus [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.Points.task_points: Task: open_metrics is worth: 0 points [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'open_metrics' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points: Task: 'open_metrics' type: bonus [2025-06-19 23:19:15] DEBUG -- CNTI-CNFManager.Points.upsert_task-open_metrics: Task start time: 2025-06-19 23:19:15 UTC, end time: 2025-06-19 23:19:15 UTC [2025-06-19 23:19:15] INFO -- CNTI-CNFManager.Points.upsert_task-open_metrics: Task: 'open_metrics' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.126499303 [2025-06-19 23:19:15] INFO -- CNTI-Setup.install_cluster_tools: Installing cluster_tools on the cluster [2025-06-19 23:19:15] INFO -- CNTI: ClusterTools install [2025-06-19 23:19:15] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:19:16] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "1484183", "uid" => "369758cb-3ed3-471b-a011-4b5b93196e04"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-06-19T23:15:08Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "1484692", "uid" => "b15ac41a-b732-4dfc-9342-0b3a057a90e4"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:19:16] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file cluster_tools.yml [2025-06-19 23:19:16] INFO -- CNTI: ClusterTools wait_for_cluster_tools [2025-06-19 23:19:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-06-19 23:19:16] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:57Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "1484183", "uid" => "369758cb-3ed3-471b-a011-4b5b93196e04"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-19T23:12:42Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "1484131", "uid" => "0ed537a3-dd7f-4523-be8c-cc92249f12fc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "18", "uid" => "6540a096-e272-41d8-a161-386e574f329f"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "25", "uid" => "3bf69b14-e04e-47c2-b401-01ac67e2b525"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "11", "uid" => "bf9dde1e-d213-4b9b-a76e-2331e0268f98"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:23:46Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "4", "uid" => "aca03ac4-602a-479e-9465-c3fc642d9935"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-06-19T23:15:08Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "1484692", "uid" => "b15ac41a-b732-4dfc-9342-0b3a057a90e4"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:23:51Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "281", "uid" => "56adfc2f-0846-4aa8-b7ec-112037d8ba61"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-06-19 23:19:16] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Daemonset/cluster-tools to install [2025-06-19 23:19:16] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-06-19 23:19:16] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-06-19 23:19:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools [2025-06-19 23:19:16] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Daemonset/cluster-tools is ready [2025-06-19 23:19:16] INFO -- CNTI-Setup.install_cluster_tools: cluster_tools has been installed on the cluster [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:16] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:16] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:16] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:16] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:16] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [routed_logs] [2025-06-19 23:19:16] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.Task.task_runner.routed_logs: Starting test [2025-06-19 23:19:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name image_name: fluent/fluentd-kubernetes-daemonset [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name image_name: bitnami/fluentd [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ ✨SKIPPED: [routed_logs] Fluentd or FluentBit not configured 📶☠️ [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name image_name: fluent/fluent-bit [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:16] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'routed_logs' emoji: 📶☠️ [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'routed_logs' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.Points: Task: 'routed_logs' type: bonus [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.Points.task_points: Task: routed_logs is worth: 0 points [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'routed_logs' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.Points: Task: 'routed_logs' type: bonus [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.Points.upsert_task-routed_logs: Task start time: 2025-06-19 23:19:16 UTC, end time: 2025-06-19 23:19:16 UTC [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.Points.upsert_task-routed_logs: Task: 'routed_logs' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.424970457 [2025-06-19 23:19:16] INFO -- CNTI-tracing: Running test [2025-06-19 23:19:16] INFO -- CNTI-tracing: tracing args: # [2025-06-19 23:19:16] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:16] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:16] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:16] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:16] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:16] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:16] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:16] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:16] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:16] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:16] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [tracing] [2025-06-19 23:19:17] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Task.task_runner.tracing: Starting test [2025-06-19 23:19:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ ✨SKIPPED: [tracing] Jaeger not configured ⎈🚀 Observability and diagnostics results: 1 of 1 tests passed  [2025-06-19 23:19:17] INFO -- CNTI: local_match_by_image_name image_name: jaegertracing/jaeger-collector [2025-06-19 23:19:17] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:17] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:17] INFO -- CNTI: jaeger match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'tracing' emoji: ⎈🚀 [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'tracing' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points: Task: 'tracing' type: bonus [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: tracing is worth: 0 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'tracing' tags: ["observability", "dynamic", "workload", "bonus"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points: Task: 'tracing' type: bonus [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.upsert_task-tracing: Task start time: 2025-06-19 23:19:17 UTC, end time: 2025-06-19 23:19:17 UTC [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.upsert_task-tracing: Task: 'tracing' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.140250846 [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tags: ["observability"] [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 100, total tasks passed: 1 for tags: ["observability"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: prometheus_traffic -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: open_metrics -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: routed_logs -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: tracing -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 100, max tasks passed: 1 for tags: ["observability"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tags: ["observability"] [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 100, total tasks passed: 1 for tags: ["observability"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: prometheus_traffic -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: open_metrics -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: routed_logs -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: tracing -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 100, max tasks passed: 1 for tags: ["observability"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1100, total tasks passed: 11 for tags: ["essential"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-06-19 23:19:17] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}]} [2025-06-19 23:19:17] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}]} [2025-06-19 23:19:17] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}]} [2025-06-19 23:19:17] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}], "maximum_points" => 100} [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:17] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:17] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:17] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:17] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:17] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [reasonable_image_size] [2025-06-19 23:19:17] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:17] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:17] INFO -- CNTI-CNFManager.Task.task_runner.reasonable_image_size: Starting test [2025-06-19 23:19:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmap/docker-config [2025-06-19 23:19:17] WARN -- CNTI-KubectlClient.Get.resource.cmd: stderr: Error from server (NotFound): configmaps "docker-config" not found [2025-06-19 23:19:17] INFO -- CNTI: Install dockerd from manifest [2025-06-19 23:19:17] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/docker-config-manifest.yml [2025-06-19 23:19:17] INFO -- CNTI: Install dockerd from manifest [2025-06-19 23:19:17] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/dockerd-manifest.yml [2025-06-19 23:19:17] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": privileged (container "dockerd" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "dockerd" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "dockerd" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "dockerd" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "dockerd" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:19:17] INFO -- CNTI: Wait for dockerd install [2025-06-19 23:19:17] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Pod/dockerd to install [2025-06-19 23:19:17] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-06-19 23:19:17] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-06-19 23:19:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:18] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-06-19 23:19:18] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 0 [2025-06-19 23:19:19] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-06-19 23:19:19] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-06-19 23:19:19] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:19] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-06-19 23:19:20] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-06-19 23:19:20] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-06-19 23:19:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:20] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-06-19 23:19:21] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-06-19 23:19:21] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-06-19 23:19:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:21] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-06-19 23:19:22] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-06-19 23:19:22] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-06-19 23:19:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:22] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-06-19 23:19:23] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-06-19 23:19:23] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-06-19 23:19:23] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:24] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:25] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: dockerd [2025-06-19 23:19:25] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Pod/dockerd is ready [2025-06-19 23:19:25] DEBUG -- CNTI-reasonable_image_size: cnf_config: # [2025-06-19 23:19:25] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:19:25] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:19:25] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:19:25] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:19:25] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:19:25] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:25] INFO -- CNTI: FQDN of the docker image: coredns/coredns:1.8.0 [2025-06-19 23:19:25] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd [2025-06-19 23:19:28] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd [2025-06-19 23:19:29] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd [2025-06-19 23:19:32] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd ✔️ PASSED: [reasonable_image_size] Image size is good 🐜 ⚖👀 [2025-06-19 23:19:32] INFO -- CNTI: compressed_size: coredns/coredns:1.8.0 = '12836853 ' [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'reasonable_image_size' emoji: ⚖👀 [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_image_size' tags: ["microservice", "dynamic", "workload", "normal"] [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_image_size' type: normal [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 5 points [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_image_size' tags: ["microservice", "dynamic", "workload", "normal"] [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_image_size' type: normal [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.Points.upsert_task-reasonable_image_size: Task start time: 2025-06-19 23:19:17 UTC, end time: 2025-06-19 23:19:32 UTC [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.Points.upsert_task-reasonable_image_size: Task: 'reasonable_image_size' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:15.436109139 [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:32] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:32] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:32] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:32] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:32] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [reasonable_startup_time] [2025-06-19 23:19:32] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:32] INFO -- CNTI-CNFManager.Task.task_runner.reasonable_startup_time: Starting test [2025-06-19 23:19:32] DEBUG -- CNTI: helm [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:19:32] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:32] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:19:32] INFO -- CNTI-reasonable_startup_time: resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} [2025-06-19 23:19:32] INFO -- CNTI: total_period_failure: 30 [2025-06-19 23:19:32] INFO -- CNTI: total_extended_period: 90 [2025-06-19 23:19:32] INFO -- CNTI: startup_time: 0 [2025-06-19 23:19:32] INFO -- CNTI: adjusted_with_default: 30 [2025-06-19 23:19:32] DEBUG -- CNTI-KubectlClient.Get.match_pods_by_prefix: Get pods with with prefix: cluster-tools with field selector: [2025-06-19 23:19:32] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:32] INFO -- CNTI-KubectlClient.Get.match_pods_by_prefix: Matched pods: cluster-tools-crvg8, cluster-tools-n9lh4 [2025-06-19 23:19:32] INFO -- CNTI-k8s_instrumentation_debug: command: kubectl get all -A [2025-06-19 23:19:33] INFO -- CNTI-k8s_instrumentation_debug: output: NAMESPACE NAME READY STATUS RESTARTS AGE cnf-default pod/coredns-coredns-6d479cd5cd-vfv4q 1/1 Running 0 4m13s cnf-testsuite pod/cluster-tools-crvg8 1/1 Running 0 6m40s cnf-testsuite pod/cluster-tools-n9lh4 1/1 Running 0 6m40s cnf-testsuite pod/dockerd 1/1 Running 0 16s cnf-testsuite pod/gatekeeper-audit-76b669b584-q6z5b 1/1 Running 0 76s cnf-testsuite pod/gatekeeper-controller-manager-84cc698fbc-4mbhm 1/1 Running 0 76s cnf-testsuite pod/gatekeeper-controller-manager-84cc698fbc-rm4bt 1/1 Running 0 76s cnf-testsuite pod/gatekeeper-controller-manager-84cc698fbc-scj7x 1/1 Running 0 76s kube-system pod/coredns-7c65d6cfc9-hlg4b 1/1 Running 0 9d kube-system pod/coredns-7c65d6cfc9-n85ww 1/1 Running 0 9d kube-system pod/create-loop-devs-gj76m 1/1 Running 0 9d kube-system pod/create-loop-devs-p2hcc 1/1 Running 0 9d kube-system pod/create-loop-devs-sjps8 1/1 Running 0 9d kube-system pod/etcd-v131-control-plane 1/1 Running 0 9d kube-system pod/kindnet-f9g2x 1/1 Running 0 9d kube-system pod/kindnet-htvqt 1/1 Running 0 9d kube-system pod/kindnet-n4mpn 1/1 Running 0 9d kube-system pod/kube-apiserver-v131-control-plane 1/1 Running 0 9d kube-system pod/kube-controller-manager-v131-control-plane 1/1 Running 0 9d kube-system pod/kube-proxy-6fc9z 1/1 Running 0 9d kube-system pod/kube-proxy-cplll 1/1 Running 0 9d kube-system pod/kube-proxy-h9krb 1/1 Running 0 9d kube-system pod/kube-scheduler-v131-control-plane 1/1 Running 0 9d litmus pod/chaos-operator-ce-586f75ccbc-rcqjh 1/1 Running 0 4m24s local-path-storage pod/local-path-provisioner-5cb96f8fdd-764fw 1/1 Running 0 9d NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE cnf-default service/coredns-coredns ClusterIP 10.96.180.214 53/UDP,53/TCP 6m36s cnf-testsuite service/gatekeeper-webhook-service ClusterIP 10.96.136.94 443/TCP 76s default service/kubernetes ClusterIP 10.96.0.1 443/TCP 9d kube-system service/kube-dns ClusterIP 10.96.0.10 53/UDP,53/TCP,9153/TCP 9d NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE cnf-testsuite daemonset.apps/cluster-tools 2 2 2 2 2 6m40s kube-system daemonset.apps/create-loop-devs 3 3 3 3 3 9d kube-system daemonset.apps/kindnet 3 3 3 3 3 kubernetes.io/os=linux 9d kube-system daemonset.apps/kube-proxy 3 3 3 3 3 kubernetes.io/os=linux 9d NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE cnf-default deployment.apps/coredns-coredns 1/1 1 1 6m36s cnf-testsuite deployment.apps/gatekeeper-audit 1/1 1 1 76s cnf-testsuite deployment.apps/gatekeeper-controller-manager 3/3 3 3 76s kube-system deployment.apps/coredns 2/2 2 2 9d litmus deployment.apps/chaos-operator-ce 1/1 1 1 4m24s local-path-storage deployment.apps/local-path-provisioner 1/1 1 1 9d NAMESPACE NAME DESIRED CURRENT READY AGE cnf-default replicaset.apps/coredns-coredns-5fb664cfc 0 0 0 5m7s cnf-default replicaset.apps/coredns-coredns-6d479cd5cd 1 1 1 5m49s cnf-default replicaset.apps/coredns-coredns-844775b496 0 0 0 6m36s cnf-testsuite replicaset.apps/gatekeeper-audit-76b669b584 1 1 1 76s cnf-testsuite replicaset.apps/gatekeeper-controller-manager-84cc698fbc 3 3 3 76s kube-system replicaset.apps/coredns-7c65d6cfc9 2 2 2 9d litmus replicaset.apps/chaos-operator-ce-586f75ccbc 1 1 1 4m24s local-path-storage replicaset.apps/local-path-provisioner-5cb96f8fdd 1 1 1 9d [2025-06-19 23:19:33] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-crvg8 ✔️ PASSED: [reasonable_startup_time] CNF had a reasonable startup time 🚀  [2025-06-19 23:19:50] DEBUG -- CNTI: parsed_output: {"Extra file open flags" => "(none)", "Running the test with following options" => "", "Number of threads" => "1", "Number of IO requests" => "0", "Read/Write ratio for combined random IO test" => "1.50", "File operations" => "", "reads/s" => "4546.71", "writes/s" => "3031.14", "fsyncs/s" => "9702.74", "Throughput" => "", "read, MiB/s" => "71.04", "written, MiB/s" => "47.36", "General statistics" => "", "total time" => "10.0111s", "total number of events" => "172955", "Latency (ms)" => "", "min" => "0.00", "avg" => "0.06", "max" => "4.65", "95th percentile" => "0.17", "sum" => "9926.27", "Threads fairness" => "", "events (avg/stddev)" => "172955.0000/0.00", "execution time (avg/stddev)" => "9.9263/0.00"} [2025-06-19 23:19:50] INFO -- CNTI: startup_time_limit: 32 [2025-06-19 23:19:50] INFO -- CNTI: startup_time: 30 [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_startup_time' tags: ["microservice", "dynamic", "workload", "normal"] [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_startup_time' type: normal [2025-06-19 23:19:50] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_startup_time' tags: ["microservice", "dynamic", "workload", "normal"] [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_startup_time' type: normal [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.Points.upsert_task-reasonable_startup_time: Task start time: 2025-06-19 23:19:32 UTC, end time: 2025-06-19 23:19:50 UTC [2025-06-19 23:19:50] INFO -- CNTI-CNFManager.Points.upsert_task-reasonable_startup_time: Task: 'reasonable_startup_time' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:18.051824673 [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:50] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:50] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:50] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:50] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:50] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:50] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:50] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [single_process_type] [2025-06-19 23:19:50] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:50] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:50] INFO -- CNTI-CNFManager.Task.task_runner.single_process_type: Starting test [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:19:50] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:50] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:19:50] INFO -- CNTI: Constructed resource_named_tuple: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:19:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:51] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:51] INFO -- CNTI: pod_name: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:51] INFO -- CNTI: container_statuses: [{"containerID" => "containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:15:23Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-zcnrg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-06-19 23:19:51] INFO -- CNTI: pod_name: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.nodes_by_pod: Finding nodes with pod/coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:51] INFO -- CNTI-KubectlClient.Get.nodes_by_pod: Nodes with pod/coredns-coredns-6d479cd5cd-vfv4q list: v131-worker [2025-06-19 23:19:51] INFO -- CNTI: nodes_by_resource done [2025-06-19 23:19:51] INFO -- CNTI: before ready containerStatuses container_id 7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:19:51] INFO -- CNTI: containerStatuses container_id 7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:19:51] INFO -- CNTI: node_pid_by_container_id container_id: 7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:19:51] INFO -- CNTI: parse_container_id container_id: 7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:19:51] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:51] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:51] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:51] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:51] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:19:51Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:19:51Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:19:51] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\"\n }\n ]\n },\n \"pid\": 991870,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/991845/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/991845/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/991845/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.180.214\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.180.214:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"snapshotKey\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-19T23:15:21.881407058Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:15:23.595699326Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:19:51Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:19:51Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:19:51] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.180.214:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e" } ] }, "pid": 991870, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "io.kubernetes.cri.sandbox-name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/991845/ns/ipc", "type": "ipc" }, { "path": "/proc/991845/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/991845/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "COREDNS_COREDNS_SERVICE_HOST=10.96.180.214", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT=udp://10.96.180.214:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53", "KUBERNETES_PORT=tcp://10.96.0.1:443" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "snapshotKey": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-19T23:15:21.881407058Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-19T23:15:23.595699326Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:19:51] INFO -- CNTI: node_pid_by_container_id pid: 991870 [2025-06-19 23:19:51] INFO -- CNTI: node pid (should never be pid 1): 991870 [2025-06-19 23:19:51] INFO -- CNTI: node name : v131-worker [2025-06-19 23:19:51] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:51] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:51] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:51] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:52] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "991870\n", error: ""} [2025-06-19 23:19:52] INFO -- CNTI: parsed pids: ["991870"] [2025-06-19 23:19:52] INFO -- CNTI: all_statuses_by_pids [2025-06-19 23:19:52] INFO -- CNTI: all_statuses_by_pids pid: 991870 [2025-06-19 23:19:52] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:52] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:52] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:52] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:52] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:52] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991870\nNgid:\t0\nPid:\t991870\nPPid:\t991820\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991870\t1\nNSpid:\t991870\t1\nNSpgid:\t991870\t1\nNSsid:\t991870\t1\nVmPeak:\t 749080 kB\nVmSize:\t 749080 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 42160 kB\nVmRSS:\t 42160 kB\nRssAnon:\t 13000 kB\nRssFile:\t 29160 kB\nRssShmem:\t 0 kB\nVmData:\t 109192 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t23\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1429\nnonvoluntary_ctxt_switches:\t15\n", error: ""} [2025-06-19 23:19:52] DEBUG -- CNTI: proc process_statuses_by_node: ["Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991870\nNgid:\t0\nPid:\t991870\nPPid:\t991820\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991870\t1\nNSpid:\t991870\t1\nNSpgid:\t991870\t1\nNSsid:\t991870\t1\nVmPeak:\t 749080 kB\nVmSize:\t 749080 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 42160 kB\nVmRSS:\t 42160 kB\nRssAnon:\t 13000 kB\nRssFile:\t 29160 kB\nRssShmem:\t 0 kB\nVmData:\t 109192 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t23\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1429\nnonvoluntary_ctxt_switches:\t15\n"] [2025-06-19 23:19:52] INFO -- CNTI-proctree_by_pid: proctree_by_pid potential_parent_pid: 991870 [2025-06-19 23:19:52] DEBUG -- CNTI-proctree_by_pid: proc_statuses: ["Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991870\nNgid:\t0\nPid:\t991870\nPPid:\t991820\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991870\t1\nNSpid:\t991870\t1\nNSpgid:\t991870\t1\nNSsid:\t991870\t1\nVmPeak:\t 749080 kB\nVmSize:\t 749080 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 42160 kB\nVmRSS:\t 42160 kB\nRssAnon:\t 13000 kB\nRssFile:\t 29160 kB\nRssShmem:\t 0 kB\nVmData:\t 109192 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t23\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1429\nnonvoluntary_ctxt_switches:\t15\n"] [2025-06-19 23:19:52] DEBUG -- CNTI: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 991870 Ngid: 0 Pid: 991870 PPid: 991820 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 991870 1 NSpid: 991870 1 NSpgid: 991870 1 NSsid: 991870 1 VmPeak: 749080 kB VmSize: 749080 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 42160 kB VmRSS: 42160 kB RssAnon: 13000 kB RssFile: 29160 kB RssShmem: 0 kB VmData: 109192 kB VmStk: 132 kB VmExe: 22072 kB VmLib: 8 kB VmPTE: 196 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 23 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1429 nonvoluntary_ctxt_switches: 15 [2025-06-19 23:19:52] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991870", "Ngid" => "0", "Pid" => "991870", "PPid" => "991820", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "991870\t1", "NSpid" => "991870\t1", "NSpgid" => "991870\t1", "NSsid" => "991870\t1", "VmPeak" => "749080 kB", "VmSize" => "749080 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "42160 kB", "VmRSS" => "42160 kB", "RssAnon" => "13000 kB", "RssFile" => "29160 kB", "RssShmem" => "0 kB", "VmData" => "109192 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "196 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "23", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1429", "nonvoluntary_ctxt_switches" => "15"} [2025-06-19 23:19:52] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:19:52] INFO -- CNTI: cmdline_by_pid [2025-06-19 23:19:52] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:52] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:52] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:52] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:52] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 ✔️ 🏆PASSED: [single_process_type] Only one process type used ⚖👀 [2025-06-19 23:19:53] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-06-19 23:19:53] INFO -- CNTI: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-06-19 23:19:53] DEBUG -- CNTI-proctree_by_pid: current_pid == potential_parent_pid [2025-06-19 23:19:53] DEBUG -- CNTI-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991870", "Ngid" => "0", "Pid" => "991870", "PPid" => "991820", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "991870\t1", "NSpid" => "991870\t1", "NSpgid" => "991870\t1", "NSsid" => "991870\t1", "VmPeak" => "749080 kB", "VmSize" => "749080 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "42160 kB", "VmRSS" => "42160 kB", "RssAnon" => "13000 kB", "RssFile" => "29160 kB", "RssShmem" => "0 kB", "VmData" => "109192 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "196 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "23", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1429", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] [2025-06-19 23:19:53] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:19:53] INFO -- CNTI-single_process_type: status name: coredns [2025-06-19 23:19:53] INFO -- CNTI-single_process_type: previous status name: initial_name [2025-06-19 23:19:53] INFO -- CNTI: container_status_result.all?(true): false [2025-06-19 23:19:53] INFO -- CNTI: pod_resp.all?(true): false [2025-06-19 23:19:53] INFO -- CNTI: Constructed resource_named_tuple: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'single_process_type' emoji: ⚖👀 [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'single_process_type' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points: Task: 'single_process_type' type: essential [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'single_process_type' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points: Task: 'single_process_type' type: essential [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-single_process_type: Task start time: 2025-06-19 23:19:50 UTC, end time: 2025-06-19 23:19:53 UTC [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Points.upsert_task-single_process_type: Task: 'single_process_type' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:02.167454930 [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:53] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:53] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [service_discovery] [2025-06-19 23:19:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Task.task_runner.service_discovery: Starting test [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource services ✔️ ✨PASSED: [service_discovery] Some containers exposed as a service ⚖👀 [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:53] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:53] DEBUG -- CNTI: Matching pods for service coredns-coredns: [{"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-06-19T23:15:20Z", "generateName" => "coredns-coredns-6d479cd5cd-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "6d479cd5cd"}, "name" => "coredns-coredns-6d479cd5cd-vfv4q", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-6d479cd5cd", "uid" => "44acbf22-e3fe-4e3f-b0f1-924cd3da843d"}], "resourceVersion" => "1484878", "uid" => "939e29f4-e4ac-4983-b04a-1f956bc46939"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-zcnrg", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v131-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-zcnrg", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:24Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:41Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:41Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:20Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:15:23Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-zcnrg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.6", "hostIPs" => [{"ip" => "172.24.0.6"}], "phase" => "Running", "podIP" => "10.244.1.216", "podIPs" => [{"ip" => "10.244.1.216"}], "qosClass" => "Guaranteed", "startTime" => "2025-06-19T23:15:20Z"}}] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'service_discovery' emoji: ⚖👀 [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_discovery' tags: ["microservice", "dynamic", "workload", "bonus"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points: Task: 'service_discovery' type: bonus [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_discovery' tags: ["microservice", "dynamic", "workload", "bonus"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points: Task: 'service_discovery' type: bonus [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-service_discovery: Task start time: 2025-06-19 23:19:53 UTC, end time: 2025-06-19 23:19:53 UTC [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Points.upsert_task-service_discovery: Task: 'service_discovery' has status: 'passed' and is awarded: 1 points.Runtime: 00:00:00.426561137 [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:53] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:53] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [shared_database] [2025-06-19 23:19:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Task.task_runner.shared_database: Starting test [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ N/A: [shared_database] [shared_database] No MariaDB containers were found 💾 [2025-06-19 23:19:53] INFO -- CNTI: local_match_by_image_name image_name: bitnami/mariadb [2025-06-19 23:19:53] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:53] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'shared_database' emoji: 💾 [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'shared_database' tags: ["microservice", "dynamic", "workload", "normal"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points: Task: 'shared_database' type: normal [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Points.task_points: Task: shared_database is worth: 0 points [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'shared_database' tags: ["microservice", "dynamic", "workload", "normal"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points: Task: 'shared_database' type: normal [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-shared_database: Task start time: 2025-06-19 23:19:53 UTC, end time: 2025-06-19 23:19:53 UTC [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Points.upsert_task-shared_database: Task: 'shared_database' has status: 'na' and is awarded: 0 points.Runtime: 00:00:00.138590112 [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:53] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:53] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [specialized_init_system] [2025-06-19 23:19:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.Task.task_runner.specialized_init_system: Starting test [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:19:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:19:53] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:19:53] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:53] INFO -- CNTI-specialized_init_system: Checking resource Deployment/coredns-coredns in cnf-default [2025-06-19 23:19:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:54] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:54] INFO -- CNTI-specialized_init_system: Pod count for resource Deployment/coredns-coredns in cnf-default: 1 [2025-06-19 23:19:54] INFO -- CNTI-specialized_init_system: Inspecting pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-06-19T23:15:20Z", "generateName" => "coredns-coredns-6d479cd5cd-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "6d479cd5cd"}, "name" => "coredns-coredns-6d479cd5cd-vfv4q", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-6d479cd5cd", "uid" => "44acbf22-e3fe-4e3f-b0f1-924cd3da843d"}], "resourceVersion" => "1484878", "uid" => "939e29f4-e4ac-4983-b04a-1f956bc46939"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-zcnrg", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v131-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-zcnrg", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:24Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:41Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:41Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-06-19T23:15:20Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-19T23:15:23Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-zcnrg", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.6", "hostIPs" => [{"ip" => "172.24.0.6"}], "phase" => "Running", "podIP" => "10.244.1.216", "podIPs" => [{"ip" => "10.244.1.216"}], "qosClass" => "Guaranteed", "startTime" => "2025-06-19T23:15:20Z"}} [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.nodes_by_pod: Finding nodes with pod/coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:54] INFO -- CNTI-KubectlClient.Get.nodes_by_pod: Nodes with pod/coredns-coredns-6d479cd5cd-vfv4q list: v131-worker [2025-06-19 23:19:54] INFO -- CNTI: parse_container_id container_id: containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:19:54] INFO -- CNTI: node_pid_by_container_id container_id: 7d07d88a3f6493 [2025-06-19 23:19:54] INFO -- CNTI: parse_container_id container_id: 7d07d88a3f6493 [2025-06-19 23:19:54] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:54] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:54] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:54] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:54] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:19:54Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:19:54Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:19:54] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\"\n }\n ]\n },\n \"pid\": 991870,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/991845/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/991845/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/991845/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.180.214\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.180.214:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"snapshotKey\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-19T23:15:21.881407058Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:15:23.595699326Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:19:54Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:19:54Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:19:54] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.180.214:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e" } ] }, "pid": 991870, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "io.kubernetes.cri.sandbox-name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/991845/ns/ipc", "type": "ipc" }, { "path": "/proc/991845/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/991845/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "COREDNS_COREDNS_SERVICE_HOST=10.96.180.214", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT=udp://10.96.180.214:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53", "KUBERNETES_PORT=tcp://10.96.0.1:443" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "snapshotKey": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-19T23:15:21.881407058Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-19T23:15:23.595699326Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:19:54] INFO -- CNTI: node_pid_by_container_id pid: 991870 [2025-06-19 23:19:54] INFO -- CNTI: cmdline_by_pid [2025-06-19 23:19:54] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:55] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:55] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:55] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 pod/coredns-coredns-6d479cd5cd-vfv4q has container 'coredns' with /coredns as init process ✖️ 🏆FAILED: [specialized_init_system] Containers do not use specialized init systems (ভ_ভ) ރ 🚀 [2025-06-19 23:19:55] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-06-19 23:19:55] INFO -- CNTI: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-06-19 23:19:55] INFO -- CNTI-InitSystems.scan: pod/coredns-coredns-6d479cd5cd-vfv4q has container 'coredns' with /coredns as init process [2025-06-19 23:19:55] INFO -- CNTI-specialized_init_system: Pod scan result: [InitSystems::InitSystemInfo(@kind="pod", @namespace="cnf-default", @name="coredns-coredns-6d479cd5cd-vfv4q", @container="coredns", @init_cmd="/coredns")] [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'specialized_init_system' emoji: 🚀 [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'specialized_init_system' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.Points: Task: 'specialized_init_system' type: essential [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 0 points [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'specialized_init_system' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.Points: Task: 'specialized_init_system' type: essential [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.Points.upsert_task-specialized_init_system: Task start time: 2025-06-19 23:19:53 UTC, end time: 2025-06-19 23:19:55 UTC [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.Points.upsert_task-specialized_init_system: Task: 'specialized_init_system' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:01.565199249 [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:55] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:19:55] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:19:55] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:19:55] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:19:55] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [sig_term_handled] [2025-06-19 23:19:55] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.Task.task_runner.sig_term_handled: Starting test [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:19:55] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:19:55] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:19:55] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:19:55] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:19:55] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:55] INFO -- CNTI-KubectlClient.wait.wait_for_resource_availability: Waiting for pod/coredns-coredns-6d479cd5cd-vfv4q to be available [2025-06-19 23:19:55] INFO -- CNTI-KubectlClient.wait.wait_for_resource_availability: seconds elapsed while waiting: 0 [2025-06-19 23:19:58] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource pod/coredns-coredns-6d479cd5cd-vfv4q is ready [2025-06-19 23:19:58] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/coredns-coredns-6d479cd5cd-vfv4q* with field selector: [2025-06-19 23:19:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:59] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:59] DEBUG -- CNTI-KubectlClient.Get.nodes_by_pod: Finding nodes with pod/coredns-coredns-6d479cd5cd-vfv4q [2025-06-19 23:19:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-06-19 23:19:59] INFO -- CNTI-KubectlClient.Get.nodes_by_pod: Nodes with pod/coredns-coredns-6d479cd5cd-vfv4q list: v131-worker [2025-06-19 23:19:59] INFO -- CNTI: node_pid_by_container_id container_id: containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:19:59] INFO -- CNTI: parse_container_id container_id: containerd://7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c [2025-06-19 23:19:59] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:59] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:59] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:59] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:59] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:19:59] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-06-19T23:19:59Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-06-19T23:19:59Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-06-19 23:19:59] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.180.214\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.180.214:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\"\n }\n ]\n },\n \"pid\": 991870,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/991845/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/991845/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/991845/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.180.214\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.180.214:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4\",\n \"snapshotKey\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-19T23:15:21.881407058Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-6d479cd5cd-vfv4q\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"939e29f4-e4ac-4983-b04a-1f956bc46939\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-19T23:15:23.595699326Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-06-19T23:19:59Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-06-19T23:19:59Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-06-19 23:19:59] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.180.214" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.180.214:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.180.214:53" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e" } ] }, "pid": 991870, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "io.kubernetes.cri.sandbox-name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pod939e29f4_e4ac_4983_b04a_1f956bc46939.slice:cri-containerd:7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/991845/ns/ipc", "type": "ipc" }, { "path": "/proc/991845/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/991845/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-6d479cd5cd-vfv4q", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.180.214:53", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "COREDNS_COREDNS_SERVICE_HOST=10.96.180.214", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.180.214", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT=udp://10.96.180.214:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.180.214:53", "KUBERNETES_PORT=tcp://10.96.0.1:443" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "c678d9537168336dd1af2c1b88e81bfb210489211cd1a6c7d04b1a057fae7ea4", "snapshotKey": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-19T23:15:21.881407058Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "7d07d88a3f649300978d3841f48a0f0eb0da6b07fcf6bf9e2afb3955eef8681c", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-6d479cd5cd-vfv4q", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "939e29f4-e4ac-4983-b04a-1f956bc46939" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-6d479cd5cd-vfv4q_939e29f4-e4ac-4983-b04a-1f956bc46939/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/volumes/kubernetes.io~projected/kube-api-access-zcnrg", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/939e29f4-e4ac-4983-b04a-1f956bc46939/containers/coredns/5af3d54e", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-19T23:15:23.595699326Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-06-19 23:19:59] INFO -- CNTI: node_pid_by_container_id pid: 991870 [2025-06-19 23:19:59] INFO -- CNTI: pids [2025-06-19 23:19:59] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:19:59] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:19:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:19:59] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:19:59] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:19:59] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:00] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "1\n1751\n180\n196\n306\n394\n398\n442\n449\n497\n689\n801\n826\n858\n989952\n989978\n990003\n991390\n991413\n991440\n991820\n991845\n991870\n992656\n992683\n992715\n992721\n992757\n992815\n993807\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} [2025-06-19 23:20:00] INFO -- CNTI: pids ls_proc: {status: Process::Status[0], output: "1\n1751\n180\n196\n306\n394\n398\n442\n449\n497\n689\n801\n826\n858\n989952\n989978\n990003\n991390\n991413\n991440\n991820\n991845\n991870\n992656\n992683\n992715\n992721\n992757\n992815\n993807\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} [2025-06-19 23:20:00] DEBUG -- CNTI: parse_ls ls: 1 1751 180 196 306 394 398 442 449 497 689 801 826 858 989952 989978 990003 991390 991413 991440 991820 991845 991870 992656 992683 992715 992721 992757 992815 993807 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo [2025-06-19 23:20:00] DEBUG -- CNTI: parse_ls parsed: ["1", "1751", "180", "196", "306", "394", "398", "442", "449", "497", "689", "801", "826", "858", "989952", "989978", "990003", "991390", "991413", "991440", "991820", "991845", "991870", "992656", "992683", "992715", "992721", "992757", "992815", "993807", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] [2025-06-19 23:20:00] DEBUG -- CNTI: pids_from_ls_proc ls: ["1", "1751", "180", "196", "306", "394", "398", "442", "449", "497", "689", "801", "826", "858", "989952", "989978", "990003", "991390", "991413", "991440", "991820", "991845", "991870", "992656", "992683", "992715", "992721", "992757", "992815", "993807", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] [2025-06-19 23:20:00] DEBUG -- CNTI: pids_from_ls_proc pids: ["1", "1751", "180", "196", "306", "394", "398", "442", "449", "497", "689", "801", "826", "858", "989952", "989978", "990003", "991390", "991413", "991440", "991820", "991845", "991870", "992656", "992683", "992715", "992721", "992757", "992815", "993807"] [2025-06-19 23:20:00] INFO -- CNTI: all_statuses_by_pids [2025-06-19 23:20:00] INFO -- CNTI: all_statuses_by_pids pid: 1 [2025-06-19 23:20:00] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:00] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:00] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:00] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:00] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:00] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 32748 kB\nVmSize:\t 31308 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 23700 kB\nVmRSS:\t 22388 kB\nRssAnon:\t 13976 kB\nRssFile:\t 8412 kB\nRssShmem:\t 0 kB\nVmData:\t 13300 kB\nVmStk:\t 132 kB\nVmExe:\t 40 kB\nVmLib:\t 10688 kB\nVmPTE:\t 96 kB\nVmSwap:\t 16 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t248709\nnonvoluntary_ctxt_switches:\t11224\n", error: ""} [2025-06-19 23:20:00] INFO -- CNTI: all_statuses_by_pids pid: 1751 [2025-06-19 23:20:00] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:00] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:00] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:00] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:00] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:00] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1751\nNgid:\t0\nPid:\t1751\nPPid:\t858\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1751\t888\nNSpid:\t1751\t888\nNSpgid:\t858\t1\nNSsid:\t858\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:00] INFO -- CNTI: all_statuses_by_pids pid: 180 [2025-06-19 23:20:00] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:00] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:01] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:01] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:01] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:01] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t180\nNgid:\t0\nPid:\t180\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t180\nNSpid:\t180\nNSpgid:\t180\nNSsid:\t180\nVmPeak:\t 336004 kB\nVmSize:\t 336004 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 216912 kB\nVmRSS:\t 216912 kB\nRssAnon:\t 1160 kB\nRssFile:\t 6900 kB\nRssShmem:\t 208852 kB\nVmData:\t 8964 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9736 kB\nVmPTE:\t 560 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t181323\nnonvoluntary_ctxt_switches:\t480\n", error: ""} [2025-06-19 23:20:01] INFO -- CNTI: all_statuses_by_pids pid: 196 [2025-06-19 23:20:01] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:01] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:01] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:01] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:01] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:01] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t196\nNgid:\t0\nPid:\t196\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t1024\nGroups:\t0 \nNStgid:\t196\nNSpid:\t196\nNSpgid:\t196\nNSsid:\t196\nVmPeak:\t 7992632 kB\nVmSize:\t 7745692 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 149992 kB\nVmRSS:\t 81416 kB\nRssAnon:\t 55596 kB\nRssFile:\t 25820 kB\nRssShmem:\t 0 kB\nVmData:\t 738044 kB\nVmStk:\t 132 kB\nVmExe:\t 18236 kB\nVmLib:\t 1524 kB\nVmPTE:\t 1152 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t67\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t126\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:01] INFO -- CNTI: all_statuses_by_pids pid: 306 [2025-06-19 23:20:01] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:01] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:01] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:01] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:01] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:02] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t306\nNgid:\t558684\nPid:\t306\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t306\nNSpid:\t306\nNSpgid:\t306\nNSsid:\t306\nVmPeak:\t 7874152 kB\nVmSize:\t 7808616 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 114760 kB\nVmRSS:\t 109892 kB\nRssAnon:\t 71560 kB\nRssFile:\t 38332 kB\nRssShmem:\t 0 kB\nVmData:\t 872840 kB\nVmStk:\t 132 kB\nVmExe:\t 35360 kB\nVmLib:\t 1560 kB\nVmPTE:\t 1176 kB\nVmSwap:\t 596 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t88\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t2117870\nnonvoluntary_ctxt_switches:\t2099\n", error: ""} [2025-06-19 23:20:02] INFO -- CNTI: all_statuses_by_pids pid: 394 [2025-06-19 23:20:02] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:02] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:02] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:02] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:02] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:02] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t394\nNgid:\t0\nPid:\t394\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t394\nNSpid:\t394\nNSpgid:\t394\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10268 kB\nVmRSS:\t 9860 kB\nRssAnon:\t 3064 kB\nRssFile:\t 6796 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:02] INFO -- CNTI: all_statuses_by_pids pid: 398 [2025-06-19 23:20:02] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:02] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:02] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:02] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:02] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:02] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t398\nNgid:\t0\nPid:\t398\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t398\nNSpid:\t398\nNSpgid:\t398\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11340 kB\nVmRSS:\t 11204 kB\nRssAnon:\t 3640 kB\nRssFile:\t 7564 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:02] INFO -- CNTI: all_statuses_by_pids pid: 442 [2025-06-19 23:20:02] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:02] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:02] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:02] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:02] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:03] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t442\nNgid:\t0\nPid:\t442\nPPid:\t394\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t442\t1\nNSpid:\t442\t1\nNSpgid:\t442\t1\nNSsid:\t442\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-06-19 23:20:03] INFO -- CNTI: all_statuses_by_pids pid: 449 [2025-06-19 23:20:03] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:03] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:03] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:03] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:03] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:03] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:03] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t449\nNgid:\t0\nPid:\t449\nPPid:\t398\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t449\t1\nNSpid:\t449\t1\nNSpgid:\t449\t1\nNSsid:\t449\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t133\nnonvoluntary_ctxt_switches:\t10\n", error: ""} [2025-06-19 23:20:03] INFO -- CNTI: all_statuses_by_pids pid: 497 [2025-06-19 23:20:03] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:03] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:03] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:03] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:03] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:03] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:03] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t497\nNgid:\t559558\nPid:\t497\nPPid:\t394\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t497\t1\nNSpid:\t497\t1\nNSpgid:\t497\t1\nNSsid:\t497\t1\nVmPeak:\t 1296940 kB\nVmSize:\t 1296940 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 57204 kB\nVmRSS:\t 31452 kB\nRssAnon:\t 17044 kB\nRssFile:\t 14408 kB\nRssShmem:\t 0 kB\nVmData:\t 70032 kB\nVmStk:\t 132 kB\nVmExe:\t 29500 kB\nVmLib:\t 8 kB\nVmPTE:\t 276 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t33\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t19526\nnonvoluntary_ctxt_switches:\t70\n", error: ""} [2025-06-19 23:20:03] INFO -- CNTI: all_statuses_by_pids pid: 689 [2025-06-19 23:20:03] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:03] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:03] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:04] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:04] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:04] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:04] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t689\nNgid:\t0\nPid:\t689\nPPid:\t398\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t689\t1\nNSpid:\t689\t1\nNSpgid:\t689\t1\nNSsid:\t689\t1\nVmPeak:\t 1285960 kB\nVmSize:\t 1285960 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 50012 kB\nVmRSS:\t 26068 kB\nRssAnon:\t 13076 kB\nRssFile:\t 12992 kB\nRssShmem:\t 0 kB\nVmData:\t 64400 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 260 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t37\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t777\nnonvoluntary_ctxt_switches:\t13\n", error: ""} [2025-06-19 23:20:04] INFO -- CNTI: all_statuses_by_pids pid: 801 [2025-06-19 23:20:04] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:04] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:04] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:04] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:04] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:04] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t801\nNgid:\t0\nPid:\t801\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t801\nNSpid:\t801\nNSpgid:\t801\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10324 kB\nVmRSS:\t 10064 kB\nRssAnon:\t 3228 kB\nRssFile:\t 6836 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:04] INFO -- CNTI: all_statuses_by_pids pid: 826 [2025-06-19 23:20:04] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:04] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:04] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:04] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:04] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:05] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t826\nNgid:\t0\nPid:\t826\nPPid:\t801\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t826\t1\nNSpid:\t826\t1\nNSpgid:\t826\t1\nNSsid:\t826\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t26\nnonvoluntary_ctxt_switches:\t7\n", error: ""} [2025-06-19 23:20:05] INFO -- CNTI: all_statuses_by_pids pid: 858 [2025-06-19 23:20:05] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:05] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:05] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:05] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:05] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:05] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t858\nNgid:\t0\nPid:\t858\nPPid:\t801\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t858\t1\nNSpid:\t858\t1\nNSpgid:\t858\t1\nNSsid:\t858\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t916\nnonvoluntary_ctxt_switches:\t7\n", error: ""} [2025-06-19 23:20:05] INFO -- CNTI: all_statuses_by_pids pid: 989952 [2025-06-19 23:20:05] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:05] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:05] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:05] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:05] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:05] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t989952\nNgid:\t0\nPid:\t989952\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t989952\nNSpid:\t989952\nNSpgid:\t989952\nNSsid:\t196\nVmPeak:\t 1233612 kB\nVmSize:\t 1233612 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11768 kB\nVmRSS:\t 11540 kB\nRssAnon:\t 4104 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 44920 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t57\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:05] INFO -- CNTI: all_statuses_by_pids pid: 989978 [2025-06-19 23:20:05] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:05] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:05] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:05] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:05] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:06] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t989978\nNgid:\t0\nPid:\t989978\nPPid:\t989952\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t989978\nNSpid:\t989978\nNSpgid:\t989978\nNSsid:\t989978\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-06-19 23:20:06] INFO -- CNTI: all_statuses_by_pids pid: 990003 [2025-06-19 23:20:06] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:06] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:06] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:06] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:06] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:06] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t990003\nNgid:\t0\nPid:\t990003\nPPid:\t989952\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t990003\nNSpid:\t990003\nNSpgid:\t990003\nNSsid:\t990003\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t49\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-06-19 23:20:06] INFO -- CNTI: all_statuses_by_pids pid: 991390 [2025-06-19 23:20:06] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:06] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:06] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:06] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:06] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:06] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991390\nNgid:\t0\nPid:\t991390\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991390\nNSpid:\t991390\nNSpgid:\t991390\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10512 kB\nVmRSS:\t 10388 kB\nRssAnon:\t 3144 kB\nRssFile:\t 7244 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 100 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:06] INFO -- CNTI: all_statuses_by_pids pid: 991413 [2025-06-19 23:20:06] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:06] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:07] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:07] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:07] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:07] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991413\nNgid:\t0\nPid:\t991413\nPPid:\t991390\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t991413\t1\nNSpid:\t991413\t1\nNSpgid:\t991413\t1\nNSsid:\t991413\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-06-19 23:20:07] INFO -- CNTI: all_statuses_by_pids pid: 991440 [2025-06-19 23:20:07] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:07] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:07] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:07] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:07] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:07] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991440\nNgid:\t0\nPid:\t991440\nPPid:\t991390\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t991440\t1\nNSpid:\t991440\t1\nNSpgid:\t991440\t1\nNSsid:\t991440\t1\nVmPeak:\t 1262956 kB\nVmSize:\t 1262956 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38352 kB\nVmRSS:\t 38352 kB\nRssAnon:\t 15388 kB\nRssFile:\t 22964 kB\nRssShmem:\t 0 kB\nVmData:\t 67780 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t562\nnonvoluntary_ctxt_switches:\t13\n", error: ""} [2025-06-19 23:20:07] INFO -- CNTI: all_statuses_by_pids pid: 991820 [2025-06-19 23:20:07] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:07] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:07] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:07] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:07] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:08] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991820\nNgid:\t0\nPid:\t991820\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991820\nNSpid:\t991820\nNSpgid:\t991820\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10780 kB\nVmRSS:\t 10776 kB\nRssAnon:\t 3404 kB\nRssFile:\t 7372 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:08] INFO -- CNTI: all_statuses_by_pids pid: 991845 [2025-06-19 23:20:08] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:08] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:08] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:08] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:08] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:08] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991845\nNgid:\t0\nPid:\t991845\nPPid:\t991820\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t991845\t1\nNSpid:\t991845\t1\nNSpgid:\t991845\t1\nNSsid:\t991845\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t25\nnonvoluntary_ctxt_switches:\t12\n", error: ""} [2025-06-19 23:20:08] INFO -- CNTI: all_statuses_by_pids pid: 991870 [2025-06-19 23:20:08] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:08] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:08] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:08] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:08] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:08] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991870\nNgid:\t0\nPid:\t991870\nPPid:\t991820\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991870\t1\nNSpid:\t991870\t1\nNSpgid:\t991870\t1\nNSsid:\t991870\t1\nVmPeak:\t 749080 kB\nVmSize:\t 749080 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 42940 kB\nVmRSS:\t 42940 kB\nRssAnon:\t 13220 kB\nRssFile:\t 29720 kB\nRssShmem:\t 0 kB\nVmData:\t 109192 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t23\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1429\nnonvoluntary_ctxt_switches:\t15\n", error: ""} [2025-06-19 23:20:08] INFO -- CNTI: all_statuses_by_pids pid: 992656 [2025-06-19 23:20:08] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:08] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:08] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:08] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:08] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:09] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992656\nNgid:\t0\nPid:\t992656\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t992656\nNSpid:\t992656\nNSpgid:\t992656\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10936 kB\nVmRSS:\t 10568 kB\nRssAnon:\t 3132 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t10\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:09] INFO -- CNTI: all_statuses_by_pids pid: 992683 [2025-06-19 23:20:09] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:09] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:09] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:09] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:09] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:09] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992683\nNgid:\t0\nPid:\t992683\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t992683\nNSpid:\t992683\nNSpgid:\t992683\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10468 kB\nVmRSS:\t 10060 kB\nRssAnon:\t 3212 kB\nRssFile:\t 6848 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-06-19 23:20:09] INFO -- CNTI: all_statuses_by_pids pid: 992715 [2025-06-19 23:20:09] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:09] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:09] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:09] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:09] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:09] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992715\nNgid:\t0\nPid:\t992715\nPPid:\t992656\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t992715\t1\nNSpid:\t992715\t1\nNSpgid:\t992715\t1\nNSsid:\t992715\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t33\nnonvoluntary_ctxt_switches:\t10\n", error: ""} [2025-06-19 23:20:09] INFO -- CNTI: all_statuses_by_pids pid: 992721 [2025-06-19 23:20:09] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:09] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:09] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:10] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:10] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:10] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:10] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992721\nNgid:\t0\nPid:\t992721\nPPid:\t992683\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t992721\t1\nNSpid:\t992721\t1\nNSpgid:\t992721\t1\nNSsid:\t992721\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t33\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-06-19 23:20:10] INFO -- CNTI: all_statuses_by_pids pid: 992757 [2025-06-19 23:20:10] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:10] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:10] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:10] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:10] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:10] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992757\nNgid:\t0\nPid:\t992757\nPPid:\t992656\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992757\t1\nNSpid:\t992757\t1\nNSpgid:\t992757\t1\nNSsid:\t992757\t1\nVmPeak:\t 1316304 kB\nVmSize:\t 1316304 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 103016 kB\nVmRSS:\t 96484 kB\nRssAnon:\t 43132 kB\nRssFile:\t 53352 kB\nRssShmem:\t 0 kB\nVmData:\t 107860 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 360 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t60\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t222\nnonvoluntary_ctxt_switches:\t12\n", error: ""} [2025-06-19 23:20:10] INFO -- CNTI: all_statuses_by_pids pid: 992815 [2025-06-19 23:20:10] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:10] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:10] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:10] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:10] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:11] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992815\nNgid:\t0\nPid:\t992815\nPPid:\t992683\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992815\t1\nNSpid:\t992815\t1\nNSpgid:\t992815\t1\nNSsid:\t992815\t1\nVmPeak:\t 1309456 kB\nVmSize:\t 1309456 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 86992 kB\nVmRSS:\t 86992 kB\nRssAnon:\t 34388 kB\nRssFile:\t 52604 kB\nRssShmem:\t 0 kB\nVmData:\t 88724 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 328 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t46\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t213\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-06-19 23:20:11] INFO -- CNTI: all_statuses_by_pids pid: 993807 [2025-06-19 23:20:11] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:11] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:11] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:11] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:11] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:11] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: cat: /proc/993807/status: No such file or directory command terminated with exit code 1 [2025-06-19 23:20:11] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[1], output: "", error: "cat: /proc/993807/status: No such file or directory\ncommand terminated with exit code 1\n"} [2025-06-19 23:20:11] DEBUG -- CNTI: proc process_statuses_by_node: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 32748 kB\nVmSize:\t 31308 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 23700 kB\nVmRSS:\t 22388 kB\nRssAnon:\t 13976 kB\nRssFile:\t 8412 kB\nRssShmem:\t 0 kB\nVmData:\t 13300 kB\nVmStk:\t 132 kB\nVmExe:\t 40 kB\nVmLib:\t 10688 kB\nVmPTE:\t 96 kB\nVmSwap:\t 16 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t248709\nnonvoluntary_ctxt_switches:\t11224\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1751\nNgid:\t0\nPid:\t1751\nPPid:\t858\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1751\t888\nNSpid:\t1751\t888\nNSpgid:\t858\t1\nNSsid:\t858\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t180\nNgid:\t0\nPid:\t180\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t180\nNSpid:\t180\nNSpgid:\t180\nNSsid:\t180\nVmPeak:\t 336004 kB\nVmSize:\t 336004 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 216912 kB\nVmRSS:\t 216912 kB\nRssAnon:\t 1160 kB\nRssFile:\t 6900 kB\nRssShmem:\t 208852 kB\nVmData:\t 8964 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9736 kB\nVmPTE:\t 560 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t181323\nnonvoluntary_ctxt_switches:\t480\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t196\nNgid:\t0\nPid:\t196\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t1024\nGroups:\t0 \nNStgid:\t196\nNSpid:\t196\nNSpgid:\t196\nNSsid:\t196\nVmPeak:\t 7992632 kB\nVmSize:\t 7745692 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 149992 kB\nVmRSS:\t 81416 kB\nRssAnon:\t 55596 kB\nRssFile:\t 25820 kB\nRssShmem:\t 0 kB\nVmData:\t 738044 kB\nVmStk:\t 132 kB\nVmExe:\t 18236 kB\nVmLib:\t 1524 kB\nVmPTE:\t 1152 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t67\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t126\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t306\nNgid:\t558684\nPid:\t306\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t306\nNSpid:\t306\nNSpgid:\t306\nNSsid:\t306\nVmPeak:\t 7874152 kB\nVmSize:\t 7808616 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 114760 kB\nVmRSS:\t 109892 kB\nRssAnon:\t 71560 kB\nRssFile:\t 38332 kB\nRssShmem:\t 0 kB\nVmData:\t 872840 kB\nVmStk:\t 132 kB\nVmExe:\t 35360 kB\nVmLib:\t 1560 kB\nVmPTE:\t 1176 kB\nVmSwap:\t 596 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t88\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t2117870\nnonvoluntary_ctxt_switches:\t2099\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t394\nNgid:\t0\nPid:\t394\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t394\nNSpid:\t394\nNSpgid:\t394\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10268 kB\nVmRSS:\t 9860 kB\nRssAnon:\t 3064 kB\nRssFile:\t 6796 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t398\nNgid:\t0\nPid:\t398\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t398\nNSpid:\t398\nNSpgid:\t398\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11340 kB\nVmRSS:\t 11204 kB\nRssAnon:\t 3640 kB\nRssFile:\t 7564 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t442\nNgid:\t0\nPid:\t442\nPPid:\t394\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t442\t1\nNSpid:\t442\t1\nNSpgid:\t442\t1\nNSsid:\t442\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t449\nNgid:\t0\nPid:\t449\nPPid:\t398\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t449\t1\nNSpid:\t449\t1\nNSpgid:\t449\t1\nNSsid:\t449\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t133\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t497\nNgid:\t559558\nPid:\t497\nPPid:\t394\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t497\t1\nNSpid:\t497\t1\nNSpgid:\t497\t1\nNSsid:\t497\t1\nVmPeak:\t 1296940 kB\nVmSize:\t 1296940 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 57204 kB\nVmRSS:\t 31452 kB\nRssAnon:\t 17044 kB\nRssFile:\t 14408 kB\nRssShmem:\t 0 kB\nVmData:\t 70032 kB\nVmStk:\t 132 kB\nVmExe:\t 29500 kB\nVmLib:\t 8 kB\nVmPTE:\t 276 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t33\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t19526\nnonvoluntary_ctxt_switches:\t70\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t689\nNgid:\t0\nPid:\t689\nPPid:\t398\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t689\t1\nNSpid:\t689\t1\nNSpgid:\t689\t1\nNSsid:\t689\t1\nVmPeak:\t 1285960 kB\nVmSize:\t 1285960 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 50012 kB\nVmRSS:\t 26068 kB\nRssAnon:\t 13076 kB\nRssFile:\t 12992 kB\nRssShmem:\t 0 kB\nVmData:\t 64400 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 260 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t37\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t777\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t801\nNgid:\t0\nPid:\t801\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t801\nNSpid:\t801\nNSpgid:\t801\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10324 kB\nVmRSS:\t 10064 kB\nRssAnon:\t 3228 kB\nRssFile:\t 6836 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t826\nNgid:\t0\nPid:\t826\nPPid:\t801\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t826\t1\nNSpid:\t826\t1\nNSpgid:\t826\t1\nNSsid:\t826\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t26\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t858\nNgid:\t0\nPid:\t858\nPPid:\t801\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t858\t1\nNSpid:\t858\t1\nNSpgid:\t858\t1\nNSsid:\t858\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t916\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t989952\nNgid:\t0\nPid:\t989952\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t989952\nNSpid:\t989952\nNSpgid:\t989952\nNSsid:\t196\nVmPeak:\t 1233612 kB\nVmSize:\t 1233612 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11768 kB\nVmRSS:\t 11540 kB\nRssAnon:\t 4104 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 44920 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t57\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t989978\nNgid:\t0\nPid:\t989978\nPPid:\t989952\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t989978\nNSpid:\t989978\nNSpgid:\t989978\nNSsid:\t989978\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t990003\nNgid:\t0\nPid:\t990003\nPPid:\t989952\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t990003\nNSpid:\t990003\nNSpgid:\t990003\nNSsid:\t990003\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t49\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991390\nNgid:\t0\nPid:\t991390\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991390\nNSpid:\t991390\nNSpgid:\t991390\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10512 kB\nVmRSS:\t 10388 kB\nRssAnon:\t 3144 kB\nRssFile:\t 7244 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 100 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991413\nNgid:\t0\nPid:\t991413\nPPid:\t991390\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t991413\t1\nNSpid:\t991413\t1\nNSpgid:\t991413\t1\nNSsid:\t991413\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991440\nNgid:\t0\nPid:\t991440\nPPid:\t991390\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t991440\t1\nNSpid:\t991440\t1\nNSpgid:\t991440\t1\nNSsid:\t991440\t1\nVmPeak:\t 1262956 kB\nVmSize:\t 1262956 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38352 kB\nVmRSS:\t 38352 kB\nRssAnon:\t 15388 kB\nRssFile:\t 22964 kB\nRssShmem:\t 0 kB\nVmData:\t 67780 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t562\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991820\nNgid:\t0\nPid:\t991820\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991820\nNSpid:\t991820\nNSpgid:\t991820\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10780 kB\nVmRSS:\t 10776 kB\nRssAnon:\t 3404 kB\nRssFile:\t 7372 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991845\nNgid:\t0\nPid:\t991845\nPPid:\t991820\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t991845\t1\nNSpid:\t991845\t1\nNSpgid:\t991845\t1\nNSsid:\t991845\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t25\nnonvoluntary_ctxt_switches:\t12\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991870\nNgid:\t0\nPid:\t991870\nPPid:\t991820\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991870\t1\nNSpid:\t991870\t1\nNSpgid:\t991870\t1\nNSsid:\t991870\t1\nVmPeak:\t 749080 kB\nVmSize:\t 749080 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 42940 kB\nVmRSS:\t 42940 kB\nRssAnon:\t 13220 kB\nRssFile:\t 29720 kB\nRssShmem:\t 0 kB\nVmData:\t 109192 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t23\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1429\nnonvoluntary_ctxt_switches:\t15\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992656\nNgid:\t0\nPid:\t992656\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t992656\nNSpid:\t992656\nNSpgid:\t992656\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10936 kB\nVmRSS:\t 10568 kB\nRssAnon:\t 3132 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t10\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992683\nNgid:\t0\nPid:\t992683\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t992683\nNSpid:\t992683\nNSpgid:\t992683\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10468 kB\nVmRSS:\t 10060 kB\nRssAnon:\t 3212 kB\nRssFile:\t 6848 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992715\nNgid:\t0\nPid:\t992715\nPPid:\t992656\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t992715\t1\nNSpid:\t992715\t1\nNSpgid:\t992715\t1\nNSsid:\t992715\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t33\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992721\nNgid:\t0\nPid:\t992721\nPPid:\t992683\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t992721\t1\nNSpid:\t992721\t1\nNSpgid:\t992721\t1\nNSsid:\t992721\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t33\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992757\nNgid:\t0\nPid:\t992757\nPPid:\t992656\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992757\t1\nNSpid:\t992757\t1\nNSpgid:\t992757\t1\nNSsid:\t992757\t1\nVmPeak:\t 1316304 kB\nVmSize:\t 1316304 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 103016 kB\nVmRSS:\t 96484 kB\nRssAnon:\t 43132 kB\nRssFile:\t 53352 kB\nRssShmem:\t 0 kB\nVmData:\t 107860 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 360 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t60\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t222\nnonvoluntary_ctxt_switches:\t12\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992815\nNgid:\t0\nPid:\t992815\nPPid:\t992683\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992815\t1\nNSpid:\t992815\t1\nNSpgid:\t992815\t1\nNSsid:\t992815\t1\nVmPeak:\t 1309456 kB\nVmSize:\t 1309456 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 86992 kB\nVmRSS:\t 86992 kB\nRssAnon:\t 34388 kB\nRssFile:\t 52604 kB\nRssShmem:\t 0 kB\nVmData:\t 88724 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 328 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t46\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t213\nnonvoluntary_ctxt_switches:\t9\n"] [2025-06-19 23:20:11] INFO -- CNTI-proctree_by_pid: proctree_by_pid potential_parent_pid: 991870 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: proc_statuses: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 32748 kB\nVmSize:\t 31308 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 23700 kB\nVmRSS:\t 22388 kB\nRssAnon:\t 13976 kB\nRssFile:\t 8412 kB\nRssShmem:\t 0 kB\nVmData:\t 13300 kB\nVmStk:\t 132 kB\nVmExe:\t 40 kB\nVmLib:\t 10688 kB\nVmPTE:\t 96 kB\nVmSwap:\t 16 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t248709\nnonvoluntary_ctxt_switches:\t11224\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1751\nNgid:\t0\nPid:\t1751\nPPid:\t858\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1751\t888\nNSpid:\t1751\t888\nNSpgid:\t858\t1\nNSsid:\t858\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t180\nNgid:\t0\nPid:\t180\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t180\nNSpid:\t180\nNSpgid:\t180\nNSsid:\t180\nVmPeak:\t 336004 kB\nVmSize:\t 336004 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 216912 kB\nVmRSS:\t 216912 kB\nRssAnon:\t 1160 kB\nRssFile:\t 6900 kB\nRssShmem:\t 208852 kB\nVmData:\t 8964 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9736 kB\nVmPTE:\t 560 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t181323\nnonvoluntary_ctxt_switches:\t480\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t196\nNgid:\t0\nPid:\t196\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t1024\nGroups:\t0 \nNStgid:\t196\nNSpid:\t196\nNSpgid:\t196\nNSsid:\t196\nVmPeak:\t 7992632 kB\nVmSize:\t 7745692 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 149992 kB\nVmRSS:\t 81416 kB\nRssAnon:\t 55596 kB\nRssFile:\t 25820 kB\nRssShmem:\t 0 kB\nVmData:\t 738044 kB\nVmStk:\t 132 kB\nVmExe:\t 18236 kB\nVmLib:\t 1524 kB\nVmPTE:\t 1152 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t67\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t126\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t306\nNgid:\t558684\nPid:\t306\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t306\nNSpid:\t306\nNSpgid:\t306\nNSsid:\t306\nVmPeak:\t 7874152 kB\nVmSize:\t 7808616 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 114760 kB\nVmRSS:\t 109892 kB\nRssAnon:\t 71560 kB\nRssFile:\t 38332 kB\nRssShmem:\t 0 kB\nVmData:\t 872840 kB\nVmStk:\t 132 kB\nVmExe:\t 35360 kB\nVmLib:\t 1560 kB\nVmPTE:\t 1176 kB\nVmSwap:\t 596 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t88\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t2117870\nnonvoluntary_ctxt_switches:\t2099\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t394\nNgid:\t0\nPid:\t394\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t394\nNSpid:\t394\nNSpgid:\t394\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10268 kB\nVmRSS:\t 9860 kB\nRssAnon:\t 3064 kB\nRssFile:\t 6796 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t398\nNgid:\t0\nPid:\t398\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t398\nNSpid:\t398\nNSpgid:\t398\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11340 kB\nVmRSS:\t 11204 kB\nRssAnon:\t 3640 kB\nRssFile:\t 7564 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t442\nNgid:\t0\nPid:\t442\nPPid:\t394\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t442\t1\nNSpid:\t442\t1\nNSpgid:\t442\t1\nNSsid:\t442\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t449\nNgid:\t0\nPid:\t449\nPPid:\t398\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t449\t1\nNSpid:\t449\t1\nNSpgid:\t449\t1\nNSsid:\t449\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t133\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t497\nNgid:\t559558\nPid:\t497\nPPid:\t394\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t497\t1\nNSpid:\t497\t1\nNSpgid:\t497\t1\nNSsid:\t497\t1\nVmPeak:\t 1296940 kB\nVmSize:\t 1296940 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 57204 kB\nVmRSS:\t 31452 kB\nRssAnon:\t 17044 kB\nRssFile:\t 14408 kB\nRssShmem:\t 0 kB\nVmData:\t 70032 kB\nVmStk:\t 132 kB\nVmExe:\t 29500 kB\nVmLib:\t 8 kB\nVmPTE:\t 276 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t33\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t19526\nnonvoluntary_ctxt_switches:\t70\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t689\nNgid:\t0\nPid:\t689\nPPid:\t398\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t689\t1\nNSpid:\t689\t1\nNSpgid:\t689\t1\nNSsid:\t689\t1\nVmPeak:\t 1285960 kB\nVmSize:\t 1285960 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 50012 kB\nVmRSS:\t 26068 kB\nRssAnon:\t 13076 kB\nRssFile:\t 12992 kB\nRssShmem:\t 0 kB\nVmData:\t 64400 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 260 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t37\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t777\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t801\nNgid:\t0\nPid:\t801\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t801\nNSpid:\t801\nNSpgid:\t801\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10324 kB\nVmRSS:\t 10064 kB\nRssAnon:\t 3228 kB\nRssFile:\t 6836 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t826\nNgid:\t0\nPid:\t826\nPPid:\t801\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t826\t1\nNSpid:\t826\t1\nNSpgid:\t826\t1\nNSsid:\t826\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t26\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t858\nNgid:\t0\nPid:\t858\nPPid:\t801\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t858\t1\nNSpid:\t858\t1\nNSpgid:\t858\t1\nNSsid:\t858\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t916\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t989952\nNgid:\t0\nPid:\t989952\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t989952\nNSpid:\t989952\nNSpgid:\t989952\nNSsid:\t196\nVmPeak:\t 1233612 kB\nVmSize:\t 1233612 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11768 kB\nVmRSS:\t 11540 kB\nRssAnon:\t 4104 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 44920 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t57\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t989978\nNgid:\t0\nPid:\t989978\nPPid:\t989952\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t989978\nNSpid:\t989978\nNSpgid:\t989978\nNSsid:\t989978\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t990003\nNgid:\t0\nPid:\t990003\nPPid:\t989952\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t990003\nNSpid:\t990003\nNSpgid:\t990003\nNSsid:\t990003\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t49\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991390\nNgid:\t0\nPid:\t991390\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991390\nNSpid:\t991390\nNSpgid:\t991390\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10512 kB\nVmRSS:\t 10388 kB\nRssAnon:\t 3144 kB\nRssFile:\t 7244 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 100 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991413\nNgid:\t0\nPid:\t991413\nPPid:\t991390\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t991413\t1\nNSpid:\t991413\t1\nNSpgid:\t991413\t1\nNSsid:\t991413\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991440\nNgid:\t0\nPid:\t991440\nPPid:\t991390\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t991440\t1\nNSpid:\t991440\t1\nNSpgid:\t991440\t1\nNSsid:\t991440\t1\nVmPeak:\t 1262956 kB\nVmSize:\t 1262956 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38352 kB\nVmRSS:\t 38352 kB\nRssAnon:\t 15388 kB\nRssFile:\t 22964 kB\nRssShmem:\t 0 kB\nVmData:\t 67780 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t562\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991820\nNgid:\t0\nPid:\t991820\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991820\nNSpid:\t991820\nNSpgid:\t991820\nNSsid:\t196\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10780 kB\nVmRSS:\t 10776 kB\nRssAnon:\t 3404 kB\nRssFile:\t 7372 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991845\nNgid:\t0\nPid:\t991845\nPPid:\t991820\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t991845\t1\nNSpid:\t991845\t1\nNSpgid:\t991845\t1\nNSsid:\t991845\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t25\nnonvoluntary_ctxt_switches:\t12\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t991870\nNgid:\t0\nPid:\t991870\nPPid:\t991820\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t991870\t1\nNSpid:\t991870\t1\nNSpgid:\t991870\t1\nNSsid:\t991870\t1\nVmPeak:\t 749080 kB\nVmSize:\t 749080 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 42940 kB\nVmRSS:\t 42940 kB\nRssAnon:\t 13220 kB\nRssFile:\t 29720 kB\nRssShmem:\t 0 kB\nVmData:\t 109192 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 196 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t23\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1429\nnonvoluntary_ctxt_switches:\t15\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992656\nNgid:\t0\nPid:\t992656\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t992656\nNSpid:\t992656\nNSpgid:\t992656\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10936 kB\nVmRSS:\t 10568 kB\nRssAnon:\t 3132 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t10\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992683\nNgid:\t0\nPid:\t992683\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t992683\nNSpid:\t992683\nNSpgid:\t992683\nNSsid:\t196\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10468 kB\nVmRSS:\t 10060 kB\nRssAnon:\t 3212 kB\nRssFile:\t 6848 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992715\nNgid:\t0\nPid:\t992715\nPPid:\t992656\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t992715\t1\nNSpid:\t992715\t1\nNSpgid:\t992715\t1\nNSsid:\t992715\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t33\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992721\nNgid:\t0\nPid:\t992721\nPPid:\t992683\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t992721\t1\nNSpid:\t992721\t1\nNSpgid:\t992721\t1\nNSsid:\t992721\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t33\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992757\nNgid:\t0\nPid:\t992757\nPPid:\t992656\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992757\t1\nNSpid:\t992757\t1\nNSpgid:\t992757\t1\nNSsid:\t992757\t1\nVmPeak:\t 1316304 kB\nVmSize:\t 1316304 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 103016 kB\nVmRSS:\t 96484 kB\nRssAnon:\t 43132 kB\nRssFile:\t 53352 kB\nRssShmem:\t 0 kB\nVmData:\t 107860 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 360 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t60\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t222\nnonvoluntary_ctxt_switches:\t12\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t992815\nNgid:\t0\nPid:\t992815\nPPid:\t992683\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t992815\t1\nNSpid:\t992815\t1\nNSpgid:\t992815\t1\nNSsid:\t992815\t1\nVmPeak:\t 1309456 kB\nVmSize:\t 1309456 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 86992 kB\nVmRSS:\t 86992 kB\nRssAnon:\t 34388 kB\nRssFile:\t 52604 kB\nRssShmem:\t 0 kB\nVmData:\t 88724 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 328 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t46\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t213\nnonvoluntary_ctxt_switches:\t9\n"] [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: 0 NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 32748 kB VmSize: 31308 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 23700 kB VmRSS: 22388 kB RssAnon: 13976 kB RssFile: 8412 kB RssShmem: 0 kB VmData: 13300 kB VmStk: 132 kB VmExe: 40 kB VmLib: 10688 kB VmPTE: 96 kB VmSwap: 16 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 248709 nonvoluntary_ctxt_switches: 11224 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "systemd", "Umask" => "0000", "State" => "S (sleeping)", "Tgid" => "1", "Ngid" => "0", "Pid" => "1", "PPid" => "0", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "0", "NStgid" => "1", "NSpid" => "1", "NSpgid" => "1", "NSsid" => "1", "VmPeak" => "32748 kB", "VmSize" => "31308 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "23700 kB", "VmRSS" => "22388 kB", "RssAnon" => "13976 kB", "RssFile" => "8412 kB", "RssShmem" => "0 kB", "VmData" => "13300 kB", "VmStk" => "132 kB", "VmExe" => "40 kB", "VmLib" => "10688 kB", "VmPTE" => "96 kB", "VmSwap" => "16 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "7fe3c0fe28014a03", "SigIgn" => "0000000000001000", "SigCgt" => "00000000000004ec", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "248709", "nonvoluntary_ctxt_switches" => "11224"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1751 Ngid: 0 Pid: 1751 PPid: 858 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1751 888 NSpid: 1751 888 NSpgid: 858 1 NSsid: 858 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 48 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "1751", "Ngid" => "0", "Pid" => "1751", "PPid" => "858", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "1751\t888", "NSpid" => "1751\t888", "NSpgid" => "858\t1", "NSsid" => "858\t1", "VmPeak" => "3552 kB", "VmSize" => "1532 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "20 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "48 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 180 Ngid: 0 Pid: 180 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 180 NSpid: 180 NSpgid: 180 NSsid: 180 VmPeak: 336004 kB VmSize: 336004 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 216912 kB VmRSS: 216912 kB RssAnon: 1160 kB RssFile: 6900 kB RssShmem: 208852 kB VmData: 8964 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9736 kB VmPTE: 560 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 181323 nonvoluntary_ctxt_switches: 480 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "systemd-journal", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "180", "Ngid" => "0", "Pid" => "180", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "180", "NSpid" => "180", "NSpgid" => "180", "NSsid" => "180", "VmPeak" => "336004 kB", "VmSize" => "336004 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "216912 kB", "VmRSS" => "216912 kB", "RssAnon" => "1160 kB", "RssFile" => "6900 kB", "RssShmem" => "208852 kB", "VmData" => "8964 kB", "VmStk" => "132 kB", "VmExe" => "92 kB", "VmLib" => "9736 kB", "VmPTE" => "560 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000400004a02", "SigIgn" => "0000000000001000", "SigCgt" => "0000000100000040", "CapInh" => "0000000000000000", "CapPrm" => "00000025402800cf", "CapEff" => "00000025402800cf", "CapBnd" => "00000025402800cf", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "20", "Speculation_Store_Bypass" => "thread force mitigated", "SpeculationIndirectBranch" => "conditional force disabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "181323", "nonvoluntary_ctxt_switches" => "480"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 196 Ngid: 0 Pid: 196 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 1024 Groups: 0 NStgid: 196 NSpid: 196 NSpgid: 196 NSsid: 196 VmPeak: 7992632 kB VmSize: 7745692 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 149992 kB VmRSS: 81416 kB RssAnon: 55596 kB RssFile: 25820 kB RssShmem: 0 kB VmData: 738044 kB VmStk: 132 kB VmExe: 18236 kB VmLib: 1524 kB VmPTE: 1152 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 67 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 126 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "196", "Ngid" => "0", "Pid" => "196", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "1024", "Groups" => "0", "NStgid" => "196", "NSpid" => "196", "NSpgid" => "196", "NSsid" => "196", "VmPeak" => "7992632 kB", "VmSize" => "7745692 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "149992 kB", "VmRSS" => "81416 kB", "RssAnon" => "55596 kB", "RssFile" => "25820 kB", "RssShmem" => "0 kB", "VmData" => "738044 kB", "VmStk" => "132 kB", "VmExe" => "18236 kB", "VmLib" => "1524 kB", "VmPTE" => "1152 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "67", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "126", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 306 Ngid: 558684 Pid: 306 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: 0 NStgid: 306 NSpid: 306 NSpgid: 306 NSsid: 306 VmPeak: 7874152 kB VmSize: 7808616 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 114760 kB VmRSS: 109892 kB RssAnon: 71560 kB RssFile: 38332 kB RssShmem: 0 kB VmData: 872840 kB VmStk: 132 kB VmExe: 35360 kB VmLib: 1560 kB VmPTE: 1176 kB VmSwap: 596 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 88 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 2117870 nonvoluntary_ctxt_switches: 2099 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "kubelet", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "306", "Ngid" => "558684", "Pid" => "306", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "0", "NStgid" => "306", "NSpid" => "306", "NSpgid" => "306", "NSsid" => "306", "VmPeak" => "7874152 kB", "VmSize" => "7808616 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "114760 kB", "VmRSS" => "109892 kB", "RssAnon" => "71560 kB", "RssFile" => "38332 kB", "RssShmem" => "0 kB", "VmData" => "872840 kB", "VmStk" => "132 kB", "VmExe" => "35360 kB", "VmLib" => "1560 kB", "VmPTE" => "1176 kB", "VmSwap" => "596 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "88", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "2117870", "nonvoluntary_ctxt_switches" => "2099"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 394 Ngid: 0 Pid: 394 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 394 NSpid: 394 NSpgid: 394 NSsid: 196 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10268 kB VmRSS: 9860 kB RssAnon: 3064 kB RssFile: 6796 kB RssShmem: 0 kB VmData: 41016 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 108 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "394", "Ngid" => "0", "Pid" => "394", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "394", "NSpid" => "394", "NSpgid" => "394", "NSsid" => "196", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10268 kB", "VmRSS" => "9860 kB", "RssAnon" => "3064 kB", "RssFile" => "6796 kB", "RssShmem" => "0 kB", "VmData" => "41016 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "108 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 398 Ngid: 0 Pid: 398 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 398 NSpid: 398 NSpgid: 398 NSsid: 196 VmPeak: 1233548 kB VmSize: 1233548 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 11340 kB VmRSS: 11204 kB RssAnon: 3640 kB RssFile: 7564 kB RssShmem: 0 kB VmData: 40760 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 104 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "398", "Ngid" => "0", "Pid" => "398", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "398", "NSpid" => "398", "NSpgid" => "398", "NSsid" => "196", "VmPeak" => "1233548 kB", "VmSize" => "1233548 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "11340 kB", "VmRSS" => "11204 kB", "RssAnon" => "3640 kB", "RssFile" => "7564 kB", "RssShmem" => "0 kB", "VmData" => "40760 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "104 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 442 Ngid: 0 Pid: 442 PPid: 394 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 442 1 NSpid: 442 1 NSpgid: 442 1 NSsid: 442 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 28 nonvoluntary_ctxt_switches: 8 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "442", "Ngid" => "0", "Pid" => "442", "PPid" => "394", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "442\t1", "NSpid" => "442\t1", "NSpgid" => "442\t1", "NSsid" => "442\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "28", "nonvoluntary_ctxt_switches" => "8"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 449 Ngid: 0 Pid: 449 PPid: 398 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 449 1 NSpid: 449 1 NSpgid: 449 1 NSsid: 449 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 133 nonvoluntary_ctxt_switches: 10 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "449", "Ngid" => "0", "Pid" => "449", "PPid" => "398", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "449\t1", "NSpid" => "449\t1", "NSpgid" => "449\t1", "NSsid" => "449\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "133", "nonvoluntary_ctxt_switches" => "10"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 497 Ngid: 559558 Pid: 497 PPid: 394 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 497 1 NSpid: 497 1 NSpgid: 497 1 NSsid: 497 1 VmPeak: 1296940 kB VmSize: 1296940 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 57204 kB VmRSS: 31452 kB RssAnon: 17044 kB RssFile: 14408 kB RssShmem: 0 kB VmData: 70032 kB VmStk: 132 kB VmExe: 29500 kB VmLib: 8 kB VmPTE: 276 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 33 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 19526 nonvoluntary_ctxt_switches: 70 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "kube-proxy", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "497", "Ngid" => "559558", "Pid" => "497", "PPid" => "394", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "497\t1", "NSpid" => "497\t1", "NSpgid" => "497\t1", "NSsid" => "497\t1", "VmPeak" => "1296940 kB", "VmSize" => "1296940 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "57204 kB", "VmRSS" => "31452 kB", "RssAnon" => "17044 kB", "RssFile" => "14408 kB", "RssShmem" => "0 kB", "VmData" => "70032 kB", "VmStk" => "132 kB", "VmExe" => "29500 kB", "VmLib" => "8 kB", "VmPTE" => "276 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "33", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "19526", "nonvoluntary_ctxt_switches" => "70"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 689 Ngid: 0 Pid: 689 PPid: 398 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 689 1 NSpid: 689 1 NSpgid: 689 1 NSsid: 689 1 VmPeak: 1285960 kB VmSize: 1285960 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 50012 kB VmRSS: 26068 kB RssAnon: 13076 kB RssFile: 12992 kB RssShmem: 0 kB VmData: 64400 kB VmStk: 132 kB VmExe: 25108 kB VmLib: 8 kB VmPTE: 260 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 37 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 777 nonvoluntary_ctxt_switches: 13 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "kindnetd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "689", "Ngid" => "0", "Pid" => "689", "PPid" => "398", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "689\t1", "NSpid" => "689\t1", "NSpgid" => "689\t1", "NSsid" => "689\t1", "VmPeak" => "1285960 kB", "VmSize" => "1285960 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "50012 kB", "VmRSS" => "26068 kB", "RssAnon" => "13076 kB", "RssFile" => "12992 kB", "RssShmem" => "0 kB", "VmData" => "64400 kB", "VmStk" => "132 kB", "VmExe" => "25108 kB", "VmLib" => "8 kB", "VmPTE" => "260 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "37", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80435fb", "CapEff" => "00000000a80435fb", "CapBnd" => "00000000a80435fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "777", "nonvoluntary_ctxt_switches" => "13"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 801 Ngid: 0 Pid: 801 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 801 NSpid: 801 NSpgid: 801 NSsid: 196 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10324 kB VmRSS: 10064 kB RssAnon: 3228 kB RssFile: 6836 kB RssShmem: 0 kB VmData: 45112 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 7 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "801", "Ngid" => "0", "Pid" => "801", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "801", "NSpid" => "801", "NSpgid" => "801", "NSsid" => "196", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10324 kB", "VmRSS" => "10064 kB", "RssAnon" => "3228 kB", "RssFile" => "6836 kB", "RssShmem" => "0 kB", "VmData" => "45112 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "7", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 826 Ngid: 0 Pid: 826 PPid: 801 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 826 1 NSpid: 826 1 NSpgid: 826 1 NSsid: 826 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 26 nonvoluntary_ctxt_switches: 7 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "826", "Ngid" => "0", "Pid" => "826", "PPid" => "801", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "826\t1", "NSpid" => "826\t1", "NSpgid" => "826\t1", "NSsid" => "826\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "26", "nonvoluntary_ctxt_switches" => "7"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 858 Ngid: 0 Pid: 858 PPid: 801 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 858 1 NSpid: 858 1 NSpgid: 858 1 NSsid: 858 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 48 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 916 nonvoluntary_ctxt_switches: 7 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "858", "Ngid" => "0", "Pid" => "858", "PPid" => "801", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "858\t1", "NSpid" => "858\t1", "NSpgid" => "858\t1", "NSsid" => "858\t1", "VmPeak" => "3552 kB", "VmSize" => "1564 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "972 kB", "VmRSS" => "84 kB", "RssAnon" => "80 kB", "RssFile" => "4 kB", "RssShmem" => "0 kB", "VmData" => "52 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "48 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000004", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "916", "nonvoluntary_ctxt_switches" => "7"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 989952 Ngid: 0 Pid: 989952 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 989952 NSpid: 989952 NSpgid: 989952 NSsid: 196 VmPeak: 1233612 kB VmSize: 1233612 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 11768 kB VmRSS: 11540 kB RssAnon: 4104 kB RssFile: 7436 kB RssShmem: 0 kB VmData: 44920 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 57 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "989952", "Ngid" => "0", "Pid" => "989952", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "989952", "NSpid" => "989952", "NSpgid" => "989952", "NSsid" => "196", "VmPeak" => "1233612 kB", "VmSize" => "1233612 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "11768 kB", "VmRSS" => "11540 kB", "RssAnon" => "4104 kB", "RssFile" => "7436 kB", "RssShmem" => "0 kB", "VmData" => "44920 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "57", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 989978 Ngid: 0 Pid: 989978 PPid: 989952 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 989978 NSpid: 989978 NSpgid: 989978 NSsid: 989978 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "989978", "Ngid" => "0", "Pid" => "989978", "PPid" => "989952", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "989978", "NSpid" => "989978", "NSpgid" => "989978", "NSsid" => "989978", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "29", "nonvoluntary_ctxt_switches" => "9"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 990003 Ngid: 0 Pid: 990003 PPid: 989952 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 990003 NSpid: 990003 NSpgid: 990003 NSsid: 990003 VmPeak: 2488 kB VmSize: 2488 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 928 kB VmRSS: 928 kB RssAnon: 88 kB RssFile: 840 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1524 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 49 nonvoluntary_ctxt_switches: 8 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "990003", "Ngid" => "0", "Pid" => "990003", "PPid" => "989952", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "990003", "NSpid" => "990003", "NSpgid" => "990003", "NSsid" => "990003", "VmPeak" => "2488 kB", "VmSize" => "2488 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "928 kB", "VmRSS" => "928 kB", "RssAnon" => "88 kB", "RssFile" => "840 kB", "RssShmem" => "0 kB", "VmData" => "224 kB", "VmStk" => "132 kB", "VmExe" => "20 kB", "VmLib" => "1524 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "49", "nonvoluntary_ctxt_switches" => "8"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 991390 Ngid: 0 Pid: 991390 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 991390 NSpid: 991390 NSpgid: 991390 NSsid: 196 VmPeak: 1233548 kB VmSize: 1233548 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10512 kB VmRSS: 10388 kB RssAnon: 3144 kB RssFile: 7244 kB RssShmem: 0 kB VmData: 40760 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 100 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991390", "Ngid" => "0", "Pid" => "991390", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "991390", "NSpid" => "991390", "NSpgid" => "991390", "NSsid" => "196", "VmPeak" => "1233548 kB", "VmSize" => "1233548 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10512 kB", "VmRSS" => "10388 kB", "RssAnon" => "3144 kB", "RssFile" => "7244 kB", "RssShmem" => "0 kB", "VmData" => "40760 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "100 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 991413 Ngid: 0 Pid: 991413 PPid: 991390 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 991413 1 NSpid: 991413 1 NSpgid: 991413 1 NSsid: 991413 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 28 nonvoluntary_ctxt_switches: 9 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991413", "Ngid" => "0", "Pid" => "991413", "PPid" => "991390", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "991413\t1", "NSpid" => "991413\t1", "NSpgid" => "991413\t1", "NSsid" => "991413\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "28", "nonvoluntary_ctxt_switches" => "9"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 991440 Ngid: 0 Pid: 991440 PPid: 991390 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 991440 1 NSpid: 991440 1 NSpgid: 991440 1 NSsid: 991440 1 VmPeak: 1262956 kB VmSize: 1262956 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38352 kB VmRSS: 38352 kB RssAnon: 15388 kB RssFile: 22964 kB RssShmem: 0 kB VmData: 67780 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 196 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 35 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 562 nonvoluntary_ctxt_switches: 13 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "chaos-operator", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991440", "Ngid" => "0", "Pid" => "991440", "PPid" => "991390", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "1000\t1000\t1000\t1000", "FDSize" => "64", "Groups" => "1000", "NStgid" => "991440\t1", "NSpid" => "991440\t1", "NSpgid" => "991440\t1", "NSsid" => "991440\t1", "VmPeak" => "1262956 kB", "VmSize" => "1262956 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "38352 kB", "VmRSS" => "38352 kB", "RssAnon" => "15388 kB", "RssFile" => "22964 kB", "RssShmem" => "0 kB", "VmData" => "67780 kB", "VmStk" => "132 kB", "VmExe" => "15232 kB", "VmLib" => "8 kB", "VmPTE" => "196 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "35", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "562", "nonvoluntary_ctxt_switches" => "13"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 991820 Ngid: 0 Pid: 991820 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 991820 NSpid: 991820 NSpgid: 991820 NSsid: 196 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10780 kB VmRSS: 10776 kB RssAnon: 3404 kB RssFile: 7372 kB RssShmem: 0 kB VmData: 41016 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 108 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 7 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991820", "Ngid" => "0", "Pid" => "991820", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "991820", "NSpid" => "991820", "NSpgid" => "991820", "NSsid" => "196", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10780 kB", "VmRSS" => "10776 kB", "RssAnon" => "3404 kB", "RssFile" => "7372 kB", "RssShmem" => "0 kB", "VmData" => "41016 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "108 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "7", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 991845 Ngid: 0 Pid: 991845 PPid: 991820 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 991845 1 NSpid: 991845 1 NSpgid: 991845 1 NSsid: 991845 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 25 nonvoluntary_ctxt_switches: 12 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991845", "Ngid" => "0", "Pid" => "991845", "PPid" => "991820", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "991845\t1", "NSpid" => "991845\t1", "NSpgid" => "991845\t1", "NSsid" => "991845\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "25", "nonvoluntary_ctxt_switches" => "12"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] DEBUG -- CNTI: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 991870 Ngid: 0 Pid: 991870 PPid: 991820 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 991870 1 NSpid: 991870 1 NSpgid: 991870 1 NSsid: 991870 1 VmPeak: 749080 kB VmSize: 749080 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 42940 kB VmRSS: 42940 kB RssAnon: 13220 kB RssFile: 29720 kB RssShmem: 0 kB VmData: 109192 kB VmStk: 132 kB VmExe: 22072 kB VmLib: 8 kB VmPTE: 196 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 23 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1429 nonvoluntary_ctxt_switches: 15 [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991870", "Ngid" => "0", "Pid" => "991870", "PPid" => "991820", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "991870\t1", "NSpid" => "991870\t1", "NSpgid" => "991870\t1", "NSsid" => "991870\t1", "VmPeak" => "749080 kB", "VmSize" => "749080 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "42940 kB", "VmRSS" => "42940 kB", "RssAnon" => "13220 kB", "RssFile" => "29720 kB", "RssShmem" => "0 kB", "VmData" => "109192 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "196 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "23", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1429", "nonvoluntary_ctxt_switches" => "15"} [2025-06-19 23:20:11] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:11] INFO -- CNTI: cmdline_by_pid [2025-06-19 23:20:11] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:11] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:11] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:11] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:11] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:12] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-06-19 23:20:12] INFO -- CNTI: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: current_pid == potential_parent_pid [2025-06-19 23:20:12] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 992656 Ngid: 0 Pid: 992656 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 992656 NSpid: 992656 NSpgid: 992656 NSsid: 196 VmPeak: 1233548 kB VmSize: 1233548 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10936 kB VmRSS: 10568 kB RssAnon: 3132 kB RssFile: 7436 kB RssShmem: 0 kB VmData: 40760 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 108 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 10 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "992656", "Ngid" => "0", "Pid" => "992656", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "992656", "NSpid" => "992656", "NSpgid" => "992656", "NSsid" => "196", "VmPeak" => "1233548 kB", "VmSize" => "1233548 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10936 kB", "VmRSS" => "10568 kB", "RssAnon" => "3132 kB", "RssFile" => "7436 kB", "RssShmem" => "0 kB", "VmData" => "40760 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "108 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "10", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:12] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 992683 Ngid: 0 Pid: 992683 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 992683 NSpid: 992683 NSpgid: 992683 NSsid: 196 VmPeak: 1233548 kB VmSize: 1233548 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10468 kB VmRSS: 10060 kB RssAnon: 3212 kB RssFile: 6848 kB RssShmem: 0 kB VmData: 40760 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 104 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "992683", "Ngid" => "0", "Pid" => "992683", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "992683", "NSpid" => "992683", "NSpgid" => "992683", "NSsid" => "196", "VmPeak" => "1233548 kB", "VmSize" => "1233548 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10468 kB", "VmRSS" => "10060 kB", "RssAnon" => "3212 kB", "RssFile" => "6848 kB", "RssShmem" => "0 kB", "VmData" => "40760 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "104 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:12] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 992715 Ngid: 0 Pid: 992715 PPid: 992656 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 992715 1 NSpid: 992715 1 NSpgid: 992715 1 NSsid: 992715 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 33 nonvoluntary_ctxt_switches: 10 [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "992715", "Ngid" => "0", "Pid" => "992715", "PPid" => "992656", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "992715\t1", "NSpid" => "992715\t1", "NSpgid" => "992715\t1", "NSsid" => "992715\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "33", "nonvoluntary_ctxt_switches" => "10"} [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:12] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 992721 Ngid: 0 Pid: 992721 PPid: 992683 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 992721 1 NSpid: 992721 1 NSpgid: 992721 1 NSsid: 992721 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 33 nonvoluntary_ctxt_switches: 9 [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "992721", "Ngid" => "0", "Pid" => "992721", "PPid" => "992683", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "992721\t1", "NSpid" => "992721\t1", "NSpgid" => "992721\t1", "NSsid" => "992721\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "33", "nonvoluntary_ctxt_switches" => "9"} [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:12] DEBUG -- CNTI: parse_status status_output: Name: manager Umask: 0022 State: S (sleeping) Tgid: 992757 Ngid: 0 Pid: 992757 PPid: 992656 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 999 999 999 999 FDSize: 64 Groups: 999 NStgid: 992757 1 NSpid: 992757 1 NSpgid: 992757 1 NSsid: 992757 1 VmPeak: 1316304 kB VmSize: 1316304 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 103016 kB VmRSS: 96484 kB RssAnon: 43132 kB RssFile: 53352 kB RssShmem: 0 kB VmData: 107860 kB VmStk: 132 kB VmExe: 32292 kB VmLib: 8 kB VmPTE: 360 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 60 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 0000000000000000 CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 222 nonvoluntary_ctxt_switches: 12 [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "manager", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "992757", "Ngid" => "0", "Pid" => "992757", "PPid" => "992656", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "999\t999\t999\t999", "FDSize" => "64", "Groups" => "999", "NStgid" => "992757\t1", "NSpid" => "992757\t1", "NSpgid" => "992757\t1", "NSsid" => "992757\t1", "VmPeak" => "1316304 kB", "VmSize" => "1316304 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "103016 kB", "VmRSS" => "96484 kB", "RssAnon" => "43132 kB", "RssFile" => "53352 kB", "RssShmem" => "0 kB", "VmData" => "107860 kB", "VmStk" => "132 kB", "VmExe" => "32292 kB", "VmLib" => "8 kB", "VmPTE" => "360 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "60", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "0000000000000000", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "222", "nonvoluntary_ctxt_switches" => "12"} [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:12] DEBUG -- CNTI: parse_status status_output: Name: manager Umask: 0022 State: S (sleeping) Tgid: 992815 Ngid: 0 Pid: 992815 PPid: 992683 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 999 999 999 999 FDSize: 64 Groups: 999 NStgid: 992815 1 NSpid: 992815 1 NSpgid: 992815 1 NSsid: 992815 1 VmPeak: 1309456 kB VmSize: 1309456 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 86992 kB VmRSS: 86992 kB RssAnon: 34388 kB RssFile: 52604 kB RssShmem: 0 kB VmData: 88724 kB VmStk: 132 kB VmExe: 32292 kB VmLib: 8 kB VmPTE: 328 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 46 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 0000000000000000 CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 213 nonvoluntary_ctxt_switches: 9 [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "manager", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "992815", "Ngid" => "0", "Pid" => "992815", "PPid" => "992683", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "999\t999\t999\t999", "FDSize" => "64", "Groups" => "999", "NStgid" => "992815\t1", "NSpid" => "992815\t1", "NSpgid" => "992815\t1", "NSsid" => "992815\t1", "VmPeak" => "1309456 kB", "VmSize" => "1309456 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "86992 kB", "VmRSS" => "86992 kB", "RssAnon" => "34388 kB", "RssFile" => "52604 kB", "RssShmem" => "0 kB", "VmData" => "88724 kB", "VmStk" => "132 kB", "VmExe" => "32292 kB", "VmLib" => "8 kB", "VmPTE" => "328 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "46", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "0000000000000000", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "213", "nonvoluntary_ctxt_switches" => "9"} [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "991870", "Ngid" => "0", "Pid" => "991870", "PPid" => "991820", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "991870\t1", "NSpid" => "991870\t1", "NSpgid" => "991870\t1", "NSsid" => "991870\t1", "VmPeak" => "749080 kB", "VmSize" => "749080 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "42940 kB", "VmRSS" => "42940 kB", "RssAnon" => "13220 kB", "RssFile" => "29720 kB", "RssShmem" => "0 kB", "VmData" => "109192 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "196 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "23", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1429", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] [2025-06-19 23:20:12] DEBUG -- CNTI-proctree_by_pid: [2025-06-19 23:20:12] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:12] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:12] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:12] INFO -- CNTI-KubectlClient.Utils.exec_bg: Exec background command in pod cluster-tools-n9lh4 [2025-06-19 23:20:12] DEBUG -- CNTI: ClusterTools exec: {process: #), @wait_count=2, @channel=#>, output: "", error: ""} [2025-06-19 23:20:13] DEBUG -- CNTI: Time left: 9 seconds [2025-06-19 23:20:13] INFO -- CNTI-sig_term_handled: Attached strace to PIDs: 991870 [2025-06-19 23:20:16] INFO -- CNTI: exec_by_node: Called with JSON [2025-06-19 23:20:16] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-06-19 23:20:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-06-19 23:20:16] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-n9lh4 [2025-06-19 23:20:16] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-n9lh4 [2025-06-19 23:20:16] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-n9lh4 [2025-06-19 23:20:21] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "", error: ""} ✔️ 🏆PASSED: [sig_term_handled] Sig Term handled ⚖👀 Microservice results: 5 of 7 tests passed  [2025-06-19 23:20:24] INFO -- CNTI-sig_term_handled: PID 991870 => SIGTERM captured? true [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'sig_term_handled' emoji: ⚖👀 [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sig_term_handled' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points: Task: 'sig_term_handled' type: essential [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sig_term_handled' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points: Task: 'sig_term_handled' type: essential [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.upsert_task-sig_term_handled: Task start time: 2025-06-19 23:19:55 UTC, end time: 2025-06-19 23:20:24 UTC [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.upsert_task-sig_term_handled: Task: 'sig_term_handled' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:29.358853221 [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tags: ["microservice"] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 211, total tasks passed: 5 for tags: ["microservice"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_image_size -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 5 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_startup_time -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_discovery -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: shared_database -> failed: false, skipped: NA: false, bonus: {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0} [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 411, max tasks passed: 7 for tags: ["microservice"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tags: ["microservice"] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 211, total tasks passed: 5 for tags: ["microservice"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_image_size -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 5 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_startup_time -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_discovery -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: shared_database -> failed: false, skipped: NA: false, bonus: {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0} [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 411, max tasks passed: 7 for tags: ["microservice"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1300, total tasks passed: 13 for tags: ["essential"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-06-19 23:20:24] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:20:24] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 211, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:20:24] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 211, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:20:24] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 211, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 411} [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:20:24] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:20:24] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:20:24] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:20:24] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:20:24] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_network_latency] [2025-06-19 23:20:24] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.Task.task_runner.pod_network_latency: Starting test [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:20:24] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:20:24] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:20:24] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:20:24] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:20:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:20:25] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:20:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:20:25] INFO -- CNTI: Current Resource Name: coredns-coredns Type: Deployment [2025-06-19 23:20:25] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:20:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:20:25] INFO -- CNTI: Spec Hash: [2025-06-19 23:20:25] INFO -- CNTI: Running for: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:20:25] INFO -- CNTI: Spec Hash: [2025-06-19 23:20:25] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-network-latency/fault.yaml, pod_network_latency_experiment.yaml [2025-06-19 23:20:25] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:20:25] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_experiment.yaml [2025-06-19 23:20:25] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:20:25] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_experiment.yaml [2025-06-19 23:20:25] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-network-latency/rbac.yaml, pod_network_latency_rbac.yaml [2025-06-19 23:20:25] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:20:25] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_rbac.yaml [2025-06-19 23:20:25] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:20:25] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_rbac.yaml [2025-06-19 23:20:26] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:20:26] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:20:26] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-network-latency-chaosengine.yml [2025-06-19 23:20:26] INFO -- CNTI: wait_for_test: coredns-coredns-83426f30-pod-network-latency [2025-06-19 23:20:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:26] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:28] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:20:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:28] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:30] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:20:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:31] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:33] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:20:33] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:33] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:35] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:20:35] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:35] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:37] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:20:37] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:37] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:39] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:20:39] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:39] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:41] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:20:41] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:41] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:43] DEBUG -- CNTI: Time left: 1783 seconds [2025-06-19 23:20:43] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:43] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:45] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:20:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:46] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:48] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:20:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:48] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:50] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:20:50] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:50] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:52] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:20:52] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:52] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:54] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:20:54] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:54] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:56] DEBUG -- CNTI: Time left: 1771 seconds [2025-06-19 23:20:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:56] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:20:58] DEBUG -- CNTI: Time left: 1768 seconds [2025-06-19 23:20:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:20:58] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:00] DEBUG -- CNTI: Time left: 1766 seconds [2025-06-19 23:21:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:00] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:02] DEBUG -- CNTI: Time left: 1764 seconds [2025-06-19 23:21:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:03] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:05] DEBUG -- CNTI: Time left: 1762 seconds [2025-06-19 23:21:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:05] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:07] DEBUG -- CNTI: Time left: 1760 seconds [2025-06-19 23:21:07] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:07] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:09] DEBUG -- CNTI: Time left: 1758 seconds [2025-06-19 23:21:09] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:09] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:11] DEBUG -- CNTI: Time left: 1756 seconds [2025-06-19 23:21:11] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:11] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:13] DEBUG -- CNTI: Time left: 1753 seconds [2025-06-19 23:21:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:13] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:15] DEBUG -- CNTI: Time left: 1751 seconds [2025-06-19 23:21:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:17] DEBUG -- CNTI: Time left: 1749 seconds [2025-06-19 23:21:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:18] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:20] DEBUG -- CNTI: Time left: 1747 seconds [2025-06-19 23:21:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:20] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:22] DEBUG -- CNTI: Time left: 1745 seconds [2025-06-19 23:21:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:22] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:24] DEBUG -- CNTI: Time left: 1743 seconds [2025-06-19 23:21:24] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:24] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:26] DEBUG -- CNTI: Time left: 1741 seconds [2025-06-19 23:21:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:26] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:28] DEBUG -- CNTI: Time left: 1738 seconds [2025-06-19 23:21:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:28] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:30] DEBUG -- CNTI: Time left: 1736 seconds [2025-06-19 23:21:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:30] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:32] DEBUG -- CNTI: Time left: 1734 seconds [2025-06-19 23:21:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:33] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:35] DEBUG -- CNTI: Time left: 1732 seconds [2025-06-19 23:21:35] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:35] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:37] DEBUG -- CNTI: Time left: 1730 seconds [2025-06-19 23:21:37] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:37] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:39] DEBUG -- CNTI: Time left: 1728 seconds [2025-06-19 23:21:39] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:39] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:41] DEBUG -- CNTI: Time left: 1726 seconds [2025-06-19 23:21:41] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:41] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:43] DEBUG -- CNTI: Time left: 1724 seconds [2025-06-19 23:21:43] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:43] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:45] DEBUG -- CNTI: Time left: 1721 seconds [2025-06-19 23:21:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:45] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:47] DEBUG -- CNTI: Time left: 1719 seconds [2025-06-19 23:21:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:48] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:50] DEBUG -- CNTI: Time left: 1717 seconds [2025-06-19 23:21:50] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:50] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:52] DEBUG -- CNTI: Time left: 1715 seconds [2025-06-19 23:21:52] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:52] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:54] DEBUG -- CNTI: Time left: 1713 seconds [2025-06-19 23:21:54] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:54] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:21:56] DEBUG -- CNTI: Time left: 1711 seconds [2025-06-19 23:21:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-83426f30 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:56] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:21:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-83426f30-pod-network-latency -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:21:56] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:21:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-83426f30-pod-network-latency -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ ✨PASSED: [pod_network_latency] pod_network_latency chaos test passed 🗡️💀♻ [2025-06-19 23:21:56] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_network_latency' emoji: 🗡️💀♻ [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_latency' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_latency' type: bonus [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_latency' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_latency' type: bonus [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_network_latency: Task start time: 2025-06-19 23:20:24 UTC, end time: 2025-06-19 23:21:56 UTC [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.Points.upsert_task-pod_network_latency: Task: 'pod_network_latency' has status: 'passed' and is awarded: 1 points.Runtime: 00:01:31.895781913 [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:21:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:21:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:21:56] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:21:56] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:21:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_network_corruption] [2025-06-19 23:21:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.Task.task_runner.pod_network_corruption: Starting test [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:21:56] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:21:56] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:21:56] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:21:56] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:21:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:21:57] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:21:57] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:21:57] INFO -- CNTI: Current Resource Name: coredns-coredns Type: Deployment [2025-06-19 23:21:57] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:21:57] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:21:57] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-network-corruption/fault.yaml, pod_network_corruption_experiment.yaml [2025-06-19 23:21:57] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:21:57] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_experiment.yaml [2025-06-19 23:21:57] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:21:57] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_experiment.yaml [2025-06-19 23:21:57] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-network-corruption/rbac.yaml, pod_network_corruption_rbac.yaml [2025-06-19 23:21:57] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:21:57] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_rbac.yaml [2025-06-19 23:21:57] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:21:57] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_rbac.yaml [2025-06-19 23:21:58] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:21:58] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:21:58] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:21:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:21:58] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-network-corruption-chaosengine.yml [2025-06-19 23:21:58] INFO -- CNTI: wait_for_test: coredns-coredns-74-pod-network-corruption [2025-06-19 23:21:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:21:58] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:00] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:22:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:00] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:02] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:22:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:03] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:05] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:22:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:05] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:07] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:22:07] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:07] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:09] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:22:09] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:09] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:11] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:22:11] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:11] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:13] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:22:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:13] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:15] DEBUG -- CNTI: Time left: 1783 seconds [2025-06-19 23:22:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:17] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:22:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:18] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:20] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:22:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:20] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:22] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:22:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:22] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:24] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:22:24] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:24] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:26] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:22:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:26] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:28] DEBUG -- CNTI: Time left: 1771 seconds [2025-06-19 23:22:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:28] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:30] DEBUG -- CNTI: Time left: 1768 seconds [2025-06-19 23:22:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:30] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:32] DEBUG -- CNTI: Time left: 1766 seconds [2025-06-19 23:22:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:33] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:35] DEBUG -- CNTI: Time left: 1764 seconds [2025-06-19 23:22:35] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:35] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:37] DEBUG -- CNTI: Time left: 1762 seconds [2025-06-19 23:22:37] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:37] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:39] DEBUG -- CNTI: Time left: 1760 seconds [2025-06-19 23:22:39] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:39] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:41] DEBUG -- CNTI: Time left: 1758 seconds [2025-06-19 23:22:41] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:41] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:43] DEBUG -- CNTI: Time left: 1756 seconds [2025-06-19 23:22:43] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:43] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:45] DEBUG -- CNTI: Time left: 1753 seconds [2025-06-19 23:22:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:45] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:47] DEBUG -- CNTI: Time left: 1751 seconds [2025-06-19 23:22:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:47] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:49] DEBUG -- CNTI: Time left: 1749 seconds [2025-06-19 23:22:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:50] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:52] DEBUG -- CNTI: Time left: 1747 seconds [2025-06-19 23:22:52] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:52] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:54] DEBUG -- CNTI: Time left: 1745 seconds [2025-06-19 23:22:54] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:54] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:56] DEBUG -- CNTI: Time left: 1743 seconds [2025-06-19 23:22:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:56] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:22:58] DEBUG -- CNTI: Time left: 1741 seconds [2025-06-19 23:22:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:22:58] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:00] DEBUG -- CNTI: Time left: 1739 seconds [2025-06-19 23:23:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:00] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:02] DEBUG -- CNTI: Time left: 1736 seconds [2025-06-19 23:23:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:02] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:04] DEBUG -- CNTI: Time left: 1734 seconds [2025-06-19 23:23:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:05] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:07] DEBUG -- CNTI: Time left: 1732 seconds [2025-06-19 23:23:07] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:07] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:09] DEBUG -- CNTI: Time left: 1730 seconds [2025-06-19 23:23:09] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:09] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:11] DEBUG -- CNTI: Time left: 1728 seconds [2025-06-19 23:23:11] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:11] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:13] DEBUG -- CNTI: Time left: 1726 seconds [2025-06-19 23:23:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:13] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:15] DEBUG -- CNTI: Time left: 1724 seconds [2025-06-19 23:23:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:17] DEBUG -- CNTI: Time left: 1721 seconds [2025-06-19 23:23:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:19] DEBUG -- CNTI: Time left: 1719 seconds [2025-06-19 23:23:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:19] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:21] DEBUG -- CNTI: Time left: 1717 seconds [2025-06-19 23:23:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-74 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:22] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:23:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-74-pod-network-corruption -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:23:22] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:23:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-74-pod-network-corruption -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ ✨PASSED: [pod_network_corruption] pod_network_corruption chaos test passed 🗡️💀♻ [2025-06-19 23:23:22] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_network_corruption' emoji: 🗡️💀♻ [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_corruption' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_corruption' type: bonus [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_corruption' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_corruption' type: bonus [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_network_corruption: Task start time: 2025-06-19 23:21:56 UTC, end time: 2025-06-19 23:23:22 UTC [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.Points.upsert_task-pod_network_corruption: Task: 'pod_network_corruption' has status: 'passed' and is awarded: 1 points.Runtime: 00:01:25.439313607 [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:23:22] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:23:22] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:23:22] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:23:22] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:23:22] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [disk_fill] [2025-06-19 23:23:22] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.Task.task_runner.disk_fill: Starting test [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:23:22] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:23:22] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:23:22] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:23:22] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:23:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:23:22] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:23:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:23:22] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:23:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:23:22] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/disk-fill/fault.yaml, disk_fill_experiment.yaml [2025-06-19 23:23:22] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:23:22] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_experiment.yaml [2025-06-19 23:23:22] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:23:22] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_experiment.yaml [2025-06-19 23:23:23] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/disk-fill/rbac.yaml, disk_fill_rbac.yaml [2025-06-19 23:23:23] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:23:23] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_rbac.yaml [2025-06-19 23:23:23] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:23:23] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_rbac.yaml [2025-06-19 23:23:23] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:23:23] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:23:23] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:23:23] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:23:23] INFO -- CNTI-coredns-coredns-10:spec_labels: Spec labels for chaos template. Key: app.kubernetes.io/instance; Value: coredns [2025-06-19 23:23:23] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/disk-fill-chaosengine.yml [2025-06-19 23:23:24] INFO -- CNTI: wait_for_test: coredns-coredns-10-disk-fill [2025-06-19 23:23:24] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:24] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:26] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:23:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:26] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:28] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:23:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:28] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:30] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:23:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:30] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:32] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:23:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:32] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:34] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:23:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:34] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:36] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:23:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:36] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:38] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:23:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:39] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:41] DEBUG -- CNTI: Time left: 1783 seconds [2025-06-19 23:23:41] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:41] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:43] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:23:43] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:43] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:45] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:23:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:45] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:47] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:23:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:47] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:49] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:23:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:49] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:51] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:23:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:51] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:53] DEBUG -- CNTI: Time left: 1771 seconds [2025-06-19 23:23:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:54] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:56] DEBUG -- CNTI: Time left: 1769 seconds [2025-06-19 23:23:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:56] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:23:58] DEBUG -- CNTI: Time left: 1766 seconds [2025-06-19 23:23:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:23:58] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:00] DEBUG -- CNTI: Time left: 1764 seconds [2025-06-19 23:24:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:00] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:02] DEBUG -- CNTI: Time left: 1762 seconds [2025-06-19 23:24:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:02] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:04] DEBUG -- CNTI: Time left: 1760 seconds [2025-06-19 23:24:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:04] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:06] DEBUG -- CNTI: Time left: 1758 seconds [2025-06-19 23:24:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:06] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:08] DEBUG -- CNTI: Time left: 1756 seconds [2025-06-19 23:24:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:09] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:11] DEBUG -- CNTI: Time left: 1754 seconds [2025-06-19 23:24:11] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:11] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:13] DEBUG -- CNTI: Time left: 1751 seconds [2025-06-19 23:24:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:13] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:15] DEBUG -- CNTI: Time left: 1749 seconds [2025-06-19 23:24:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:17] DEBUG -- CNTI: Time left: 1747 seconds [2025-06-19 23:24:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:19] DEBUG -- CNTI: Time left: 1745 seconds [2025-06-19 23:24:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:19] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:21] DEBUG -- CNTI: Time left: 1743 seconds [2025-06-19 23:24:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:21] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:23] DEBUG -- CNTI: Time left: 1741 seconds [2025-06-19 23:24:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:23] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:25] DEBUG -- CNTI: Time left: 1739 seconds [2025-06-19 23:24:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:26] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:28] DEBUG -- CNTI: Time left: 1736 seconds [2025-06-19 23:24:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:28] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:30] DEBUG -- CNTI: Time left: 1734 seconds [2025-06-19 23:24:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:30] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:32] DEBUG -- CNTI: Time left: 1732 seconds [2025-06-19 23:24:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:32] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:34] DEBUG -- CNTI: Time left: 1730 seconds [2025-06-19 23:24:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:34] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:36] DEBUG -- CNTI: Time left: 1728 seconds [2025-06-19 23:24:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:36] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:38] DEBUG -- CNTI: Time left: 1726 seconds [2025-06-19 23:24:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:38] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:40] DEBUG -- CNTI: Time left: 1724 seconds [2025-06-19 23:24:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:41] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:43] DEBUG -- CNTI: Time left: 1722 seconds [2025-06-19 23:24:43] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:43] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:45] DEBUG -- CNTI: Time left: 1719 seconds [2025-06-19 23:24:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:45] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:47] DEBUG -- CNTI: Time left: 1717 seconds [2025-06-19 23:24:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:47] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:49] DEBUG -- CNTI: Time left: 1715 seconds [2025-06-19 23:24:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:49] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:51] DEBUG -- CNTI: Time left: 1713 seconds [2025-06-19 23:24:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:51] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:53] DEBUG -- CNTI: Time left: 1711 seconds [2025-06-19 23:24:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-10 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:53] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:24:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-10-disk-fill -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:24:53] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:24:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-10-disk-fill -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ PASSED: [disk_fill] disk_fill chaos test passed 🗡️💀♻ [2025-06-19 23:24:54] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'disk_fill' emoji: 🗡️💀♻ [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'disk_fill' tags: ["resilience", "dynamic", "workload", "normal"] [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.Points: Task: 'disk_fill' type: normal [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'disk_fill' tags: ["resilience", "dynamic", "workload", "normal"] [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.Points: Task: 'disk_fill' type: normal [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.Points.upsert_task-disk_fill: Task start time: 2025-06-19 23:23:22 UTC, end time: 2025-06-19 23:24:54 UTC [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.Points.upsert_task-disk_fill: Task: 'disk_fill' has status: 'passed' and is awarded: 5 points.Runtime: 00:01:31.712853414 [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:24:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:24:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:24:54] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:24:54] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:24:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_delete] [2025-06-19 23:24:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.Task.task_runner.pod_delete: Starting test [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:24:54] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:24:54] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:24:54] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:24:54] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:24:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:24:54] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:24:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:24:54] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:24:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:24:54] INFO -- CNTI: Spec Hash: [2025-06-19 23:24:54] INFO -- CNTI: Running for: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-06-19 23:24:54] INFO -- CNTI: Spec Hash: [2025-06-19 23:24:54] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-delete/fault.yaml, pod_delete_experiment.yaml [2025-06-19 23:24:54] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:24:54] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_experiment.yaml [2025-06-19 23:24:54] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:24:54] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-delete/rbac.yaml, pod_delete_rbac.yaml [2025-06-19 23:24:54] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:24:54] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_rbac.yaml [2025-06-19 23:24:54] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:24:54] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_experiment.yaml [2025-06-19 23:24:55] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_rbac.yaml [2025-06-19 23:24:55] INFO -- CNTI: resource: coredns-coredns [2025-06-19 23:24:55] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:24:55] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:24:55] INFO -- CNTI: template: apiVersion: litmuschaos.io/v1alpha1 kind: ChaosEngine metadata: name: coredns-coredns-55 namespace: cnf-default spec: engineState: 'active' appinfo: appns: 'cnf-default' applabel: 'app.kubernetes.io/instance=coredns' appkind: 'deployment' chaosServiceAccount: pod-delete-sa jobCleanUpPolicy: 'delete' experiments: - name: pod-delete spec: components: env: # specify the fill percentage according to the disk pressure required - name: TOTAL_CHAOS_DURATION value: '30' - name: CHAOS_INTERVAL value: '10' - name: TARGET_PODS value: '' - name: FORCE value: 'false' [2025-06-19 23:24:55] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-delete-chaosengine.yml [2025-06-19 23:24:55] INFO -- CNTI: wait_for_test: coredns-coredns-55-pod-delete [2025-06-19 23:24:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:55] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:57] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:24:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:24:57] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:24:59] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:24:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:00] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:02] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:25:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:02] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:04] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:25:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:04] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:06] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:25:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:06] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:08] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:25:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:08] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:10] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:25:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:10] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:12] DEBUG -- CNTI: Time left: 1783 seconds [2025-06-19 23:25:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:12] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:14] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:25:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:17] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:25:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:19] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:25:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:19] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:21] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:25:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:21] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:23] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:25:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:23] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:25] DEBUG -- CNTI: Time left: 1771 seconds [2025-06-19 23:25:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:25] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:27] DEBUG -- CNTI: Time left: 1768 seconds [2025-06-19 23:25:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:27] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:29] DEBUG -- CNTI: Time left: 1766 seconds [2025-06-19 23:25:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:30] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:32] DEBUG -- CNTI: Time left: 1764 seconds [2025-06-19 23:25:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:32] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:34] DEBUG -- CNTI: Time left: 1762 seconds [2025-06-19 23:25:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:34] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:36] DEBUG -- CNTI: Time left: 1760 seconds [2025-06-19 23:25:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:36] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:38] DEBUG -- CNTI: Time left: 1758 seconds [2025-06-19 23:25:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:38] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:40] DEBUG -- CNTI: Time left: 1756 seconds [2025-06-19 23:25:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:40] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:42] DEBUG -- CNTI: Time left: 1754 seconds [2025-06-19 23:25:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:42] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:44] DEBUG -- CNTI: Time left: 1751 seconds [2025-06-19 23:25:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:44] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:46] DEBUG -- CNTI: Time left: 1749 seconds [2025-06-19 23:25:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:47] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:49] DEBUG -- CNTI: Time left: 1747 seconds [2025-06-19 23:25:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:49] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:51] DEBUG -- CNTI: Time left: 1745 seconds [2025-06-19 23:25:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:51] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:53] DEBUG -- CNTI: Time left: 1743 seconds [2025-06-19 23:25:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:53] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:55] DEBUG -- CNTI: Time left: 1741 seconds [2025-06-19 23:25:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:55] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:57] DEBUG -- CNTI: Time left: 1739 seconds [2025-06-19 23:25:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:57] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:25:59] DEBUG -- CNTI: Time left: 1736 seconds [2025-06-19 23:25:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:25:59] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:01] DEBUG -- CNTI: Time left: 1734 seconds [2025-06-19 23:26:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:02] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:04] DEBUG -- CNTI: Time left: 1732 seconds [2025-06-19 23:26:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:04] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:06] DEBUG -- CNTI: Time left: 1730 seconds [2025-06-19 23:26:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-55 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:06] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:26:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-55-pod-delete -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:26:06] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:26:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-55-pod-delete -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ PASSED: [pod_delete] pod_delete chaos test passed 🗡️💀♻ [2025-06-19 23:26:06] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_delete' emoji: 🗡️💀♻ [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_delete' tags: ["resilience", "dynamic", "workload", "normal"] [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_delete' type: normal [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_delete' tags: ["resilience", "dynamic", "workload", "normal"] [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_delete' type: normal [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_delete: Task start time: 2025-06-19 23:24:54 UTC, end time: 2025-06-19 23:26:06 UTC [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.Points.upsert_task-pod_delete: Task: 'pod_delete' has status: 'passed' and is awarded: 5 points.Runtime: 00:01:12.452450455 [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:26:06] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:26:06] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:26:06] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:26:06] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:26:06] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_memory_hog] [2025-06-19 23:26:06] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.Task.task_runner.pod_memory_hog: Starting test [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:26:06] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:26:06] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:26:06] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:26:06] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:26:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:06] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:26:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:06] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:26:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:06] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-memory-hog/fault.yaml, pod_memory_hog_experiment.yaml [2025-06-19 23:26:06] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:26:06] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_experiment.yaml [2025-06-19 23:26:06] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:26:07] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_experiment.yaml [2025-06-19 23:26:07] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-memory-hog/rbac.yaml, pod_memory_hog_rbac.yaml [2025-06-19 23:26:07] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:26:07] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_rbac.yaml [2025-06-19 23:26:07] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:26:07] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_rbac.yaml [2025-06-19 23:26:07] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:26:08] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:26:08] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:26:08] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:08] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-memory-hog-chaosengine.yml [2025-06-19 23:26:08] INFO -- CNTI: wait_for_test: coredns-coredns-0-pod-memory-hog [2025-06-19 23:26:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:08] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:10] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:26:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:10] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:12] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:26:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:12] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:14] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:26:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:14] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:16] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:26:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:19] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:26:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:19] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:21] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:26:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:21] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:23] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:26:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:23] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:25] DEBUG -- CNTI: Time left: 1783 seconds [2025-06-19 23:26:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:25] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:27] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:26:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:27] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:29] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:26:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:29] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:31] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:26:31] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:31] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:33] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:26:33] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:34] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:36] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:26:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:36] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:38] DEBUG -- CNTI: Time left: 1771 seconds [2025-06-19 23:26:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:38] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:40] DEBUG -- CNTI: Time left: 1769 seconds [2025-06-19 23:26:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-0 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:40] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:26:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-0-pod-memory-hog -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:26:40] INFO -- CNTI: status_code: 0, response: Error [2025-06-19 23:26:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-0-pod-memory-hog -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:26:40] INFO -- CNTI: status_code: 0, response: Error [2025-06-19 23:26:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-0-pod-memory-hog -n cnf-default -o 'json' ✖️ FAILED: [pod_memory_hog] pod_memory_hog chaos test failed 🗡️💀♻ [2025-06-19 23:26:40] INFO -- CNTI: status_code: 0, response: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-06-19T23:26:15Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "bf36661b-51e4-4977-8661-4d3d29df4fc1", "batch.kubernetes.io/job-name": "pod-memory-hog-8xcq4p", "chaosUID": "ef41b001-8e37-4299-b9fa-facf0c249a84", "controller-uid": "bf36661b-51e4-4977-8661-4d3d29df4fc1", "job-name": "pod-memory-hog-8xcq4p", "name": "pod-memory-hog" }, "name": "coredns-coredns-0-pod-memory-hog", "namespace": "cnf-default", "resourceVersion": "1487734", "uid": "6cf3e3f4-d34f-4335-a130-84c4c5c84116" }, "spec": { "engine": "coredns-coredns-0", "experiment": "pod-memory-hog" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-memory-hog-helper-mjgp5\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-6d479cd5cd-fdfrd, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-06-19 23:26:40] DEBUG -- CNTI-LitmusManager.check_chaos_verdict#details: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-06-19T23:26:15Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "bf36661b-51e4-4977-8661-4d3d29df4fc1", "batch.kubernetes.io/job-name": "pod-memory-hog-8xcq4p", "chaosUID": "ef41b001-8e37-4299-b9fa-facf0c249a84", "controller-uid": "bf36661b-51e4-4977-8661-4d3d29df4fc1", "job-name": "pod-memory-hog-8xcq4p", "name": "pod-memory-hog" }, "name": "coredns-coredns-0-pod-memory-hog", "namespace": "cnf-default", "resourceVersion": "1487734", "uid": "6cf3e3f4-d34f-4335-a130-84c4c5c84116" }, "spec": { "engine": "coredns-coredns-0", "experiment": "pod-memory-hog" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-memory-hog-helper-mjgp5\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-6d479cd5cd-fdfrd, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-06-19 23:26:40] INFO -- CNTI-LitmusManager.check_chaos_verdict: pod-memory-hog chaos test failed: coredns-coredns-0-pod-memory-hog, verdict: Error [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: false [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_memory_hog' emoji: 🗡️💀♻ [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_memory_hog' tags: ["resilience", "dynamic", "workload", "normal"] [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_memory_hog' type: normal [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 0 points [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_memory_hog' tags: ["resilience", "dynamic", "workload", "normal"] [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_memory_hog' type: normal [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_memory_hog: Task start time: 2025-06-19 23:26:06 UTC, end time: 2025-06-19 23:26:40 UTC [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.Points.upsert_task-pod_memory_hog: Task: 'pod_memory_hog' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:34.251101357 [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:26:40] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:26:40] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:26:40] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:26:40] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:26:40] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_io_stress] [2025-06-19 23:26:40] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.Task.task_runner.pod_io_stress: Starting test [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:26:40] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:26:40] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:26:40] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:26:40] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:26:40] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:41] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:26:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:41] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:26:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:41] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-io-stress/fault.yaml, pod_io_stress_experiment.yaml [2025-06-19 23:26:41] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:26:41] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_experiment.yaml [2025-06-19 23:26:41] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:26:41] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_experiment.yaml [2025-06-19 23:26:41] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-io-stress/rbac.yaml, pod_io_stress_rbac.yaml [2025-06-19 23:26:41] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:26:41] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_rbac.yaml [2025-06-19 23:26:41] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:26:41] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_rbac.yaml [2025-06-19 23:26:42] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:26:42] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:26:42] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:26:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:26:42] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-io-stress-chaosengine.yml [2025-06-19 23:26:42] INFO -- CNTI: wait_for_test: coredns-coredns-16-pod-io-stress [2025-06-19 23:26:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:42] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:44] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:26:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:44] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:46] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:26:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:47] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:49] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:26:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:49] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:51] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:26:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:51] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:53] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:26:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:53] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:55] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:26:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:55] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:57] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:26:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:57] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:26:59] DEBUG -- CNTI: Time left: 1783 seconds [2025-06-19 23:26:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:26:59] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:01] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:27:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:01] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:03] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:27:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:04] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:06] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:27:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:06] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:08] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:27:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:08] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:10] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:27:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-16 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:10] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:27:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-16-pod-io-stress -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:27:10] INFO -- CNTI: status_code: 0, response: Error [2025-06-19 23:27:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-16-pod-io-stress -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:27:10] INFO -- CNTI: status_code: 0, response: Error [2025-06-19 23:27:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-16-pod-io-stress -n cnf-default -o 'json' ✖️ ✨FAILED: [pod_io_stress] pod_io_stress chaos test failed 🗡️💀♻ [2025-06-19 23:27:10] INFO -- CNTI: status_code: 0, response: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-06-19T23:26:49Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "5ab47972-bbde-412c-bcdd-5c8ad9392aec", "batch.kubernetes.io/job-name": "pod-io-stress-lkhygw", "chaosUID": "2eb2907e-f4ab-438d-b185-1f83f8825a71", "controller-uid": "5ab47972-bbde-412c-bcdd-5c8ad9392aec", "job-name": "pod-io-stress-lkhygw", "name": "pod-io-stress" }, "name": "coredns-coredns-16-pod-io-stress", "namespace": "cnf-default", "resourceVersion": "1487894", "uid": "7b9498bb-f488-4467-b3e3-47a7e6a3ffb1" }, "spec": { "engine": "coredns-coredns-16", "experiment": "pod-io-stress" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-io-stress-helper-trqzn\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-6d479cd5cd-fdfrd, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-06-19 23:27:10] DEBUG -- CNTI-LitmusManager.check_chaos_verdict#details: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-06-19T23:26:49Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "5ab47972-bbde-412c-bcdd-5c8ad9392aec", "batch.kubernetes.io/job-name": "pod-io-stress-lkhygw", "chaosUID": "2eb2907e-f4ab-438d-b185-1f83f8825a71", "controller-uid": "5ab47972-bbde-412c-bcdd-5c8ad9392aec", "job-name": "pod-io-stress-lkhygw", "name": "pod-io-stress" }, "name": "coredns-coredns-16-pod-io-stress", "namespace": "cnf-default", "resourceVersion": "1487894", "uid": "7b9498bb-f488-4467-b3e3-47a7e6a3ffb1" }, "spec": { "engine": "coredns-coredns-16", "experiment": "pod-io-stress" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-io-stress-helper-trqzn\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-6d479cd5cd-fdfrd, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-06-19 23:27:10] INFO -- CNTI-LitmusManager.check_chaos_verdict: pod-io-stress chaos test failed: coredns-coredns-16-pod-io-stress, verdict: Error [2025-06-19 23:27:10] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: false [2025-06-19 23:27:10] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:27:10] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-06-19 23:27:10] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_io_stress' emoji: 🗡️💀♻ [2025-06-19 23:27:10] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_io_stress' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:27:10] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_io_stress' type: bonus [2025-06-19 23:27:10] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_io_stress is worth: 0 points [2025-06-19 23:27:10] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_io_stress' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:27:10] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_io_stress' type: bonus [2025-06-19 23:27:10] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_io_stress: Task start time: 2025-06-19 23:26:40 UTC, end time: 2025-06-19 23:27:10 UTC [2025-06-19 23:27:10] INFO -- CNTI-CNFManager.Points.upsert_task-pod_io_stress: Task: 'pod_io_stress' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:29.956068985 [2025-06-19 23:27:10] INFO -- CNTI-KubectlClient.Delete.resource: Delete resource all [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:27:11] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:27:11] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:27:11] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:27:11] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:27:11] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_dns_error] [2025-06-19 23:27:11] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.Task.task_runner.pod_dns_error: Starting test [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.container_runtimes: Get container runtimes of nodes [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ SKIPPED: [pod_dns_error] pod_dns_error docker runtime not found 🗡️💀♻ [2025-06-19 23:27:11] INFO -- CNTI: pod_dns_error runtimes: ["containerd://2.1.1"] [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_dns_error' emoji: 🗡️💀♻ [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_dns_error' tags: ["resilience", "dynamic", "workload"] [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_dns_error' type: [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 0 points [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_dns_error' tags: ["resilience", "dynamic", "workload"] [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_dns_error' type: [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_dns_error: Task start time: 2025-06-19 23:27:11 UTC, end time: 2025-06-19 23:27:11 UTC [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.Points.upsert_task-pod_dns_error: Task: 'pod_dns_error' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.159759426 [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:27:11] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:27:11] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:27:11] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:27:11] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:27:11] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_network_duplication] [2025-06-19 23:27:11] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.Task.task_runner.pod_network_duplication: Starting test [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:27:11] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:27:11] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:27:11] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:27:11] INFO -- CNTI: Current Resource Name: coredns-coredns Type: Deployment Namespace: cnf-default [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:27:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:27:11] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-network-duplication/fault.yaml, pod_network_duplication_experiment.yaml [2025-06-19 23:27:11] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:27:11] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_experiment.yaml [2025-06-19 23:27:11] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:27:11] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_experiment.yaml [2025-06-19 23:27:11] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-network-duplication/rbac.yaml, pod_network_duplication_rbac.yaml [2025-06-19 23:27:11] INFO -- CNTI: chaos_manifests_path [2025-06-19 23:27:11] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_rbac.yaml [2025-06-19 23:27:11] DEBUG -- CNTI-http.client: Performing request [2025-06-19 23:27:12] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_rbac.yaml coredns-coredns [2025-06-19 23:27:12] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-06-19 23:27:12] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-06-19 23:27:12] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-06-19 23:27:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:27:12] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-network-duplication-chaosengine.yml [2025-06-19 23:27:12] INFO -- CNTI: wait_for_test: coredns-coredns-25-pod-network-duplication [2025-06-19 23:27:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:13] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:15] DEBUG -- CNTI: Time left: 1798 seconds [2025-06-19 23:27:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:15] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:17] DEBUG -- CNTI: Time left: 1796 seconds [2025-06-19 23:27:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:19] DEBUG -- CNTI: Time left: 1794 seconds [2025-06-19 23:27:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:19] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:21] DEBUG -- CNTI: Time left: 1792 seconds [2025-06-19 23:27:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:21] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:23] DEBUG -- CNTI: Time left: 1790 seconds [2025-06-19 23:27:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:23] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:25] DEBUG -- CNTI: Time left: 1788 seconds [2025-06-19 23:27:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:25] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:27] DEBUG -- CNTI: Time left: 1786 seconds [2025-06-19 23:27:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:28] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:30] DEBUG -- CNTI: Time left: 1783 seconds [2025-06-19 23:27:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:30] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:32] DEBUG -- CNTI: Time left: 1781 seconds [2025-06-19 23:27:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:32] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:34] DEBUG -- CNTI: Time left: 1779 seconds [2025-06-19 23:27:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:34] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:36] DEBUG -- CNTI: Time left: 1777 seconds [2025-06-19 23:27:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:36] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:38] DEBUG -- CNTI: Time left: 1775 seconds [2025-06-19 23:27:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:38] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:40] DEBUG -- CNTI: Time left: 1773 seconds [2025-06-19 23:27:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:40] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:42] DEBUG -- CNTI: Time left: 1771 seconds [2025-06-19 23:27:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:42] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:44] DEBUG -- CNTI: Time left: 1768 seconds [2025-06-19 23:27:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:45] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:47] DEBUG -- CNTI: Time left: 1766 seconds [2025-06-19 23:27:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:47] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:49] DEBUG -- CNTI: Time left: 1764 seconds [2025-06-19 23:27:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:49] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:51] DEBUG -- CNTI: Time left: 1762 seconds [2025-06-19 23:27:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:51] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:53] DEBUG -- CNTI: Time left: 1760 seconds [2025-06-19 23:27:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:53] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:55] DEBUG -- CNTI: Time left: 1758 seconds [2025-06-19 23:27:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:55] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:57] DEBUG -- CNTI: Time left: 1756 seconds [2025-06-19 23:27:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:27:57] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:27:59] DEBUG -- CNTI: Time left: 1754 seconds [2025-06-19 23:27:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:00] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:02] DEBUG -- CNTI: Time left: 1751 seconds [2025-06-19 23:28:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:02] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:04] DEBUG -- CNTI: Time left: 1749 seconds [2025-06-19 23:28:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:04] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:06] DEBUG -- CNTI: Time left: 1747 seconds [2025-06-19 23:28:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:06] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:08] DEBUG -- CNTI: Time left: 1745 seconds [2025-06-19 23:28:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:08] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:10] DEBUG -- CNTI: Time left: 1743 seconds [2025-06-19 23:28:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:10] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:12] DEBUG -- CNTI: Time left: 1741 seconds [2025-06-19 23:28:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:12] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:14] DEBUG -- CNTI: Time left: 1739 seconds [2025-06-19 23:28:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:14] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:17] DEBUG -- CNTI: Time left: 1736 seconds [2025-06-19 23:28:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:17] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:19] DEBUG -- CNTI: Time left: 1734 seconds [2025-06-19 23:28:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:19] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:21] DEBUG -- CNTI: Time left: 1732 seconds [2025-06-19 23:28:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:21] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:23] DEBUG -- CNTI: Time left: 1730 seconds [2025-06-19 23:28:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:23] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:25] DEBUG -- CNTI: Time left: 1728 seconds [2025-06-19 23:28:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:25] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:27] DEBUG -- CNTI: Time left: 1726 seconds [2025-06-19 23:28:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:27] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:29] DEBUG -- CNTI: Time left: 1724 seconds [2025-06-19 23:28:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:29] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:31] DEBUG -- CNTI: Time left: 1722 seconds [2025-06-19 23:28:31] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:32] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:34] DEBUG -- CNTI: Time left: 1719 seconds [2025-06-19 23:28:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:34] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:36] DEBUG -- CNTI: Time left: 1717 seconds [2025-06-19 23:28:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:36] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:38] DEBUG -- CNTI: Time left: 1715 seconds [2025-06-19 23:28:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:38] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:40] DEBUG -- CNTI: Time left: 1713 seconds [2025-06-19 23:28:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:40] INFO -- CNTI: status_code: 0, response: initialized [2025-06-19 23:28:42] DEBUG -- CNTI: Time left: 1711 seconds [2025-06-19 23:28:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-25 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-06-19 23:28:42] INFO -- CNTI: status_code: 0, response: completed [2025-06-19 23:28:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-25-pod-network-duplication -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-06-19 23:28:42] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:28:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-25-pod-network-duplication -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ ✨PASSED: [pod_network_duplication] pod_network_duplication chaos test passed 🗡️💀♻ [2025-06-19 23:28:42] INFO -- CNTI: status_code: 0, response: Pass [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:28:42] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:28:42] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_network_duplication' emoji: 🗡️💀♻ [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_duplication' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_duplication' type: bonus [2025-06-19 23:28:42] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_duplication' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_duplication' type: bonus [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_network_duplication: Task start time: 2025-06-19 23:27:11 UTC, end time: 2025-06-19 23:28:42 UTC [2025-06-19 23:28:42] INFO -- CNTI-CNFManager.Points.upsert_task-pod_network_duplication: Task: 'pod_network_duplication' has status: 'passed' and is awarded: 1 points.Runtime: 00:01:31.751680101 [2025-06-19 23:28:42] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:28:42] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:28:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:28:43] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:28:43] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:28:43] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [liveness] [2025-06-19 23:28:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Task.task_runner.liveness: Starting test [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✔️ 🏆PASSED: [liveness] Helm liveness probe found ⎈🧫 [2025-06-19 23:28:43] INFO -- CNTI-liveness: Resource Deployment/coredns-coredns passed liveness?: true [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:28:43] INFO -- CNTI-liveness: Workload resource task response: true [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'liveness' emoji: ⎈🧫 [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'liveness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points: Task: 'liveness' type: essential [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'liveness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points: Task: 'liveness' type: essential [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.upsert_task-liveness: Task start time: 2025-06-19 23:28:43 UTC, end time: 2025-06-19 23:28:43 UTC [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.upsert_task-liveness: Task: 'liveness' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.259796296 [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:28:43] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-06-19 23:28:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-06-19 23:28:43] INFO -- CNTI: check_cnf_config args: # [2025-06-19 23:28:43] INFO -- CNTI: check_cnf_config cnf: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-06-19 23:28:43] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [readiness] [2025-06-19 23:28:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Task.task_runner.readiness: Starting test [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-06-19 23:28:43] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-06-19 23:28:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✔️ 🏆PASSED: [readiness] Helm readiness probe found ⎈🧫 Reliability, resilience, and availability results: 7 of 9 tests passed  Final workload score: 1620 of 1955 Test results have been saved to results/cnf-testsuite-results-20250619-231319-514.yml [2025-06-19 23:28:43] DEBUG -- CNTI-readiness: coredns [2025-06-19 23:28:43] INFO -- CNTI-readiness: Resource Deployment/coredns-coredns passed liveness?: true [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-06-19 23:28:43] INFO -- CNTI-readiness: Workload resource task response: true [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'readiness' emoji: ⎈🧫 [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'readiness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points: Task: 'readiness' type: essential [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'readiness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points: Task: 'readiness' type: essential [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.upsert_task-readiness: Task start time: 2025-06-19 23:28:43 UTC, end time: 2025-06-19 23:28:43 UTC [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.upsert_task-readiness: Task: 'readiness' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.250689008 [2025-06-19 23:28:43] DEBUG -- CNTI: resilience [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tags: ["resilience"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 213, total tasks passed: 7 for tags: ["resilience"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_latency -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_corruption -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_duplication -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_delete -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_io_stress -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_memory_hog -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: disk_fill -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_dns_error -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 223, max tasks passed: 9 for tags: ["resilience"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tags: ["resilience"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 213, total tasks passed: 7 for tags: ["resilience"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_latency -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_corruption -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_duplication -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_delete -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_io_stress -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_memory_hog -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: disk_fill -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_dns_error -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 223, max tasks passed: 9 for tags: ["resilience"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1500, total tasks passed: 15 for tags: ["essential"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-06-19 23:28:43] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 211, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:28:43] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:28:43] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-06-19 23:28:43] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-06-19 23:28:43] DEBUG -- CNTI: workload [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled", "cni_compatible", "privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "increase_decrease_capacity", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "versioned_tag", "ip_addresses", "operator_installed", "liveness", "readiness", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "helm_deploy", "helm_chart_valid", "helm_chart_published", "no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "alpha_k8s_apis", "container_sock_mounts", "require_labels", "external_ips", "selinux_options", "default_namespace", "latest_tag"] for tag: workload [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled", "cni_compatible", "privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "increase_decrease_capacity", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "versioned_tag", "ip_addresses", "operator_installed", "liveness", "readiness", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "helm_deploy", "helm_chart_valid", "helm_chart_published", "no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "alpha_k8s_apis", "container_sock_mounts", "require_labels", "external_ips", "selinux_options", "default_namespace", "latest_tag"] for tags: ["workload"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1620, total tasks passed: 43 for tags: ["workload"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled", "cni_compatible", "privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "increase_decrease_capacity", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "versioned_tag", "ip_addresses", "operator_installed", "liveness", "readiness", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "helm_deploy", "helm_chart_valid", "helm_chart_published", "no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "alpha_k8s_apis", "container_sock_mounts", "require_labels", "external_ips", "selinux_options", "default_namespace", "latest_tag"] for tag: workload [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_image_size -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_startup_time -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_discovery -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: shared_database -> failed: false, skipped: NA: false, bonus: {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0} [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cni_compatible -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privilege_escalation -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: symlink_file_system -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: application_credentials -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_network -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_latency -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_corruption -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_duplication -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_delete -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_io_stress -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_memory_hog -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: disk_fill -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_dns_error -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: versioned_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ip_addresses -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: ip_addresses is worth: 0 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: operator_installed -> failed: false, skipped: NA: false, bonus: {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0} [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-06-19 23:28:43] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_update -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:43] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_downgrade -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_version_change -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rollback -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: deprecated_k8s_features -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: nodeport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: secrets_used -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_configmap -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_deploy -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_valid -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_published -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: no_local_volume_configuration -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: elastic_volumes -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: database_persistence -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_account_mapping -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_pid_ipc_privileges -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: linux_hardening -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_file_systems -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ingress_egress_blocked -> failed: true, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: insecure_capabilities -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sysctls -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: prometheus_traffic -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: open_metrics -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: routed_logs -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: tracing -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: alpha_k8s_apis -> failed: false, skipped: NA: true, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: require_labels -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: external_ips -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: default_namespace -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-06-19 23:28:44] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-06-19 23:28:44] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1955, max tasks passed: 54 for tags: ["workload"] [2025-06-19 23:28:44] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-06-19 23:28:44] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1620, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-06-19 23:28:44] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1620, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-06-19 23:28:44] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1620, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1955} [2025-06-19 23:28:44] INFO -- CNTI: results yaml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1620, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1955} 2025-06-19 23:28:44,458 - functest_kubernetes.cnf_conformance.conformance - WARNING - elastic_volumes failed 2025-06-19 23:28:44,458 - functest_kubernetes.cnf_conformance.conformance - WARNING - privilege_escalation failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - linux_hardening failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - ingress_egress_blocked failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - non_root_containers failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - immutable_file_systems failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - service_account_mapping failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - immutable_configmap failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - specialized_init_system failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - pod_memory_hog failed 2025-06-19 23:28:44,459 - functest_kubernetes.cnf_conformance.conformance - WARNING - pod_io_stress failed 2025-06-19 23:28:44,467 - functest_kubernetes.cnf_conformance.conformance - INFO - +-------------------------------------------------------------+-----------------+ | NAME | STATUS | +-------------------------------------------------------------+-----------------+ | helm_chart_valid | passed | | helm_chart_published | passed | | helm_deploy | passed | | cni_compatible | skipped | | increase_decrease_capacity | passed | | rollback | passed | | deprecated_k8s_features | passed | | rolling_update | passed | | rolling_downgrade | passed | | rolling_version_change | passed | | no_local_volume_configuration | passed | | elastic_volumes | failed | | database_persistence | skipped | | node_drain | passed | | symlink_file_system | passed | | privilege_escalation | failed | | insecure_capabilities | passed | | memory_limits | passed | | cpu_limits | passed | | linux_hardening | failed | | ingress_egress_blocked | failed | | host_pid_ipc_privileges | passed | | non_root_containers | failed | | privileged_containers | passed | | immutable_file_systems | failed | | hostpath_mounts | passed | | container_sock_mounts | passed | | external_ips | passed | | selinux_options | na | | sysctls | passed | | host_network | passed | | service_account_mapping | failed | | application_credentials | passed | | nodeport_not_used | passed | | hostport_not_used | passed | | hardcoded_ip_addresses_in_k8s_runtime_configuration | passed | | secrets_used | skipped | | immutable_configmap | failed | | alpha_k8s_apis | skipped | | require_labels | passed | | latest_tag | passed | | default_namespace | passed | | operator_installed | na | | versioned_tag | passed | | log_output | passed | | prometheus_traffic | skipped | | open_metrics | skipped | | routed_logs | skipped | | tracing | skipped | | reasonable_image_size | passed | | reasonable_startup_time | passed | | single_process_type | passed | | service_discovery | passed | | shared_database | na | | specialized_init_system | failed | | sig_term_handled | passed | | pod_network_latency | passed | | pod_network_corruption | passed | | disk_fill | passed | | pod_delete | passed | | pod_memory_hog | failed | | pod_io_stress | failed | | pod_dns_error | skipped | | pod_network_duplication | passed | | liveness | passed | | readiness | passed | +-------------------------------------------------------------+-----------------+ 2025-06-19 23:28:44,502 - xtesting.ci.run_tests - INFO - Test result: +--------------------------------+------------------+------------------+----------------+ | TEST CASE | PROJECT | DURATION | RESULT | +--------------------------------+------------------+------------------+----------------+ | cnf_testsuite_workload | functest | 16:02 | PASS | +--------------------------------+------------------+------------------+----------------+ 2025-06-19 23:28:44,849 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite cnf_uninstall cnf-config=example-cnfs/coredns/cnf-testsuite.yml Successfully uninstalled helm deployment "coredns". All CNF deployments were uninstalled, some time might be needed for all resources to be down. 2025-06-19 23:29:07,840 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite uninstall_all cnf-config=example-cnfs/coredns/cnf-testsuite.yml CNF uninstallation skipped. No CNF config found in installed_cnf_files directory.  Uninstalling testsuite helper tools. Testsuite helper tools uninstalled.